This topic describes how to combine the lifecycle hook feature of Auto Scaling and a CloudOps Orchestration Service (OOS) template to first put Elastic Compute Service (ECS) instances into a Pending state and then automate the task for adding or removing the instance IP addresses to or from the IP address whitelists of ApsaraDB for MongoDB (MongoDB) instances.
Prerequisites
A scaling group is created and is in the Enabled state.
A MongoDB instance is created.
A RAM role is created for CloudOps Orchestration Service (OOS). The trusted entity of the RAM role must be Alibaba Cloud Service, the trusted service must be CloudOps Orchestration Service, and the RAM role must have the permissions to perform operations on the OOS template. For more information, see Use RAM to grant permissions to OOS.
NoteIn this topic, the OOSServiceRole RAM role is used as an example. You can also use other roles.
Background information
Auto Scaling currently supports only the integration with Server Load Balancer (SLB) and ApsaraDB RDS. If you store your application data on a MongoDB instance, manually updating the IP address whitelist for the MongoDB instance with the private IP addresses of your ECS instances leads to inefficient operation. To enhance operational efficiency, consider automating updates of the IP address whitelist for your MongoDB instance by combing the lifecycle hook feature of Auto Scaling and an OOS template. Take note of the following usage notes:
If your scaling group contains existing ECS instances, you must manually add the private IP addresses of the ECS instances to the IP address whitelist of the MongoDB instance. Otherwise, an error occurs when you remove an instance IP address from the IP address whitelist of the MongoDB instance.
You must use NotificationMetadata (metadata for short) to specify parameters required to create OOS executions.
metadata must be in the JSON string format.
The keys in metadata must match the parameters in the OOS template.
For parameters that have no default settings in the OOS template, you must specify values for these parameters. For parameters that have default settings in the OOS template, you can specify whether to overwrite their default settings.
Procedure
In this example, a public OOS template named LifeCycleModifyMongoDBIPWhitelist is used to show how to automate the addition of instance IP addresses to the IP address whitelist of a MongoDB instance during a scale-out event. Perform the following steps:
If you want to automate the removal of instance IP addresses from the IP address whitelist of your MongoDB instance, you can create a lifecycle hook for scale-in purposes and apply the lifecycle hook during a scale-in event.
Step 1: Grant a RAM role the permissions on OOS
You must have the permissions to execute OOS templates. The ACS-ESS-LifeCycleModifyMongoDBIPWhitelist template includes ECS, Auto Scaling, and MongoDB resources that are required to perform O&M tasks.
Log on to the RAM console.
Create a policy.
In the left-side navigation pane, choose .
Click Create Policy.
On the Create Policy page, click the JSON tab, configure parameters based on your business requirements, and then click OK.
The following table describes the settings that are used in this example. Any parameters not covered in the following table default to their predefined settings.
Parameter
Description
Name
Enter ESSHookPolicyForMongoDBWhitelist.
Policy document
Enter the following content:
{ "Version": "1", "Statement": [ { "Action": [ "ecs:DescribeInstances" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "dds:ModifySecurityIps" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "ess:CompleteLifecycleAction" ], "Resource": "*", "Effect": "Allow" } ] }
Attach the policy to the OOSServiceRole RAM role.
In the left-side navigation pane, choose .
Find OOSServiceRole and click Grant Permission in the Actions column.
Add the required permissions for the OOSServiceRole RAM role that is assumed by OOS to complete the authorization.
In the Grant Permission panel, configure Resource Scope and Policy. After you complete the configuration, click Grant permissions.
The following table describes the settings that are used in this example. Any parameters not covered in the following table default to their predefined settings.
Parameter
Description
Resource Scope
Set the value to Account.
Policy
Select the following custom policy: ESSHookPolicyForMongoDBWhitelist.
Step 2: Create a lifecycle hook for scale-out purposes and trigger a scale-out event
Log on to the Auto Scaling console.
In the left-side navigation pane, click Scaling Groups.
In the top navigation bar, select the region where Auto Scaling is activated.
Find a scaling group and use one of the following methods to go to the scaling group details page:
Click the ID of the scaling group in the Scaling Group Name/ID column.
Click Details in the Actions column.
Create a lifecycle hook.
In the upper part of the scaling group details page, click the Lifecycle Hook tab.
Click Create Lifecycle Hook.
Configure parameters based on your business requirements and click OK.
The following table describes the settings that are used in this example. Any parameters not covered in the following table default to their predefined settings.
Parameter
Description
Name
Enter ESSHookForAddMongoDBWhitelist.
Scaling Activity
Select Scale-out Event.
Timeout Period
Configure Timeout Period based on your business requirements. In this example, set the value to 300. Unit: seconds.
NoteThe timeout period is the period of time during which you can perform custom operations on instances. If the timeout period is shorter than the period of time that is required to perform custom operations, the operations may fail. We recommend that you estimate the period of time that is required to perform custom operations on instances and configure Timeout Period based on your estimates.
Default Execution Policy
Select Continue.
Send Notification When Lifecycle Hook Takes Effect
Configure the following parameters for the template:
Select OOS Template.
Select Public Templates.
Select LifeCycleModifyMongoDBIPWhitelist.
In the ACS-ESS-LifeCycleModifyMongoDBIPWhitelist public template, you must also configure the following parameters:
dbInstanceId: Enter the ID of the MongoDB instance. In this example, a MongoDB replica set instance is used.
modifyMode: Select Append. This value applies to the scale-out event during which Auto Scaling adds the private IP address of an ECS instance to the IP address whitelist of the MongoDB instance.
OOSAssumeRole: Select OOSServiceRole. In Step 1, OOSServiceRole is granted the permissions on the ECS, Auto Scaling, and MongoDB resources. OOS obtains the preceding permissions after it assumes the RAM role.
Trigger a scale-out event.
In this example, a scale-out event is manually triggered by executing a scaling rule. You can also trigger scale-out events by using scheduled or event-triggered tasks.
NoteIf scaling events are triggered when you manually execute scaling rules, lifecycle hooks take effect. However, lifecycle hooks do not take effect when you manually add or remove ECS instances to or from a scaling group.
In the upper part of the page that appears, click the Scaling Rules and Event-triggered Tasks tab.
On the Scaling Rules tab, click Create Scaling Rule.
In the Create Scaling Rule dialog box, configure parameters based on your business requirements and click OK.
The following table describes the settings that are used in this example. Any parameters not covered in the following table default to their predefined settings.
Parameter
Description
Rule Name
Enter Add1.
Rule Type
Select Simple Scaling Rule.
Operation
Set the value to Add 1 Instances.
On the Scaling Rules tab, find the Add1 scaling rule and click Execute in the Actions column.
In the Execute Scaling Rule message, click OK.
After the scaling rule is executed, Auto Scaling adds one ECS instance to the scaling group. However, the ECS instance enters the Pending Add state because of the ESSHookForAddMongoDBWhitelist lifecycle hook that is in effect. During the timeout period of the lifecycle hook, Auto Scaling notifies OOS to execute the O&M tasks that are defined in the ACS-ESS-LifeCycleModifyMongoDBIPWhitelist public template.
Step 3: Check the IP address whitelist of the MongoDB instance
Log on to the MongoDB console.
In the left-side navigation pane, click Replica Set Instances.
Find the desired MongoDB instance and click its ID in the Instance ID/Name column.
In the left-side navigation pane, choose .
If the private IP address of the ECS instance is added to the IP address whitelist of the MongoDB instance, the ACS-ESS-LifeCycleModifyMongoDBIPWhitelist public template takes effect as expected.
If the ECS instance is created but its private IP address is not added to the IP address whitelist of the MongoDB instance, go to the OOS console to view the execution of the O&M tasks. For more information, see (Optional) Step 4: View the OOS execution.
(Optional) Step 4: View the OOS execution
Log on to the OOS console.
In the left-side navigation pane, choose .
Find the execution task by time and click Details in the Actions column.
On the execution details page that appears, view the related information.
For example, in the Basic Information section, you can view the execution ID and status. In the Execution Steps and Results section, you can click a task node to view the execution details. For more information, see View the details of an execution.
NoteIf the execution fails, an error message is displayed on the execution details page.
Common errors and troubleshooting
If you fail to execute an O&M task, troubleshoot the issue based on the error message in the execution result. The following section describes the common error messages and solutions:
Error message: Forbidden.Unauthorized message: A required authorization for the specified action is not supplied.
Solution: Check whether the required permissions, such as the sample permissions in Step 1, are granted to the OOSServiceRole RAM role. Before OOS can manage the resources that are declared in the OOS template, you must grant the required permissions to the RAM role.
Error message: Forbidden.RAM message: User not authorized to operate on the specified resource, or this API doesn't support RAM.
Solution: Check whether the required permissions, such as the sample permissions in Step 1, are granted to the OOSServiceRole RAM role. Before OOS can manage the resources that are declared in the OOS template, you must grant the required permissions to the RAM role.
Error message: LifecycleHookIdAndLifecycleActionToken.Invalid message: The specified lifecycleActionToken and lifecycleActionId you provided does not match any in process lifecycle action.
Solution: Check whether the timeout period of the lifecycle hook is sufficient for the O&M task specified in the OOS template to complete.