This page explains how you can configure the virtual machine (VM) instances in a managed instance group (MIG) and the methods you can use to apply the configuration to existing VMs in the group.
You specify the intended configuration for the VMs in a MIG by using the following VM configuration components:
- Required: Instance template
- Optional: All-instances configuration
- Optional: Stateful configuration
Whenever you update the intended configuration by using those components, Compute Engine automatically applies your updated configuration to new VMs that are added to the group.
To apply an updated configuration to existing VMs, use the methods described on this page:
- Automatic rollouts with a disruption budget and optional canary updates of new templates
- Selective, manual updates to specific VMs only, to minimize disruption
- Re-creation of specific VMs
You can also configure your MIG to apply the latest available configuration to VMs during VM repairs. For more information, see Apply configuration updates during repairs.
If you only need to resize a MIG, see the documentation for how to add or remove VMs in a MIG. If you want to learn about configuring MIG features, see the docs for autoscaling, autohealing, load balancing, and stateful workloads.
Before you begin
-
If you haven't already, then set up authentication.
Authentication is
the process by which your identity is verified for access to Google Cloud services and APIs.
To run code or samples from a local development environment, you can authenticate to
Compute Engine by selecting one of the following options:
Select the tab for how you plan to use the samples on this page:
Console
When you use the Google Cloud console to access Google Cloud services and APIs, you don't need to set up authentication.
gcloud
-
Install the Google Cloud CLI, then initialize it by running the following command:
gcloud init
- Set a default region and zone.
REST
To use the REST API samples on this page in a local development environment, you use the credentials you provide to the gcloud CLI.
Install the Google Cloud CLI, then initialize it by running the following command:
gcloud init
For more information, see Authenticate for using REST in the Google Cloud authentication documentation.
-
Configuration components for VMs in a MIG
You configure the VMs in a MIG through the following components:
Component | Properties | Use case |
---|---|---|
Instance template | Machine type, boot disk image, labels, startup script, and other VM properties | Required: Use an instance template to define required and
optional instance properties for all VMs in the group. Optional: If you want to canary test a second VM configuration, you can add a second instance template to the group and apply it to a subset of the VMs in the group. |
All-instances configuration | Labels and metadata | Optional: Use an all-instances configuration to quickly override instance template properties for all VMs in the group. |
Stateful configuration | Stateful disks, IP addresses, and metadata | Optional: If you need to support a stateful workload, add stateful configuration to VMs in the group. |
If you update any configuration for the group through those components, you must apply the updated configuration to existing VMs in the group in order to make the updated configuration effective.
Methods to apply a new configuration to existing VMs
After you update a MIG's VM configuration, you can apply the new configuration to existing VMs in the group by using the following methods:
- Automatic (proactive): Use this method if you want the MIG to automatically apply new configurations to all or to a subset of existing VMs in the group. The level of disruption to running VMs depends on the update policy that you configure. You can use this method to canary update new instance templates. To use this method, set the MIG's update type to "proactive".
- Selective (opportunistic): Use this method if you want to apply the update manually or if you want to update all existing VMs in the group at once. You target any or all VMs to be updated to the latest configuration. To use this method, set the MIG's update type to "opportunistic".
- Re-creation of VMs: Apply new configurations by re-creating specific VMs.
For more information about setting a MIG's update type, see Set up a proactive or an opportunistic update.
Automatic (proactive)
An automatic update type is also known as a proactive update type. When you set the MIG's update type to proactive, the MIG automatically applies updated configurations to VMs as necessary.
Setting the MIG's update type to proactive offers two primary advantages:
- The rollout of an update happens automatically to your specifications, without the need for additional input after the initial request. You can specify the speed of deployment, the level of disruption to your service, and the scope of the update.
- You can automate partial rollouts, which allows for canary testing.
To learn how to set the MIG's update type, see Set up a proactive or an opportunistic update.
For more information about automatic rollouts, see Automatically apply VM configuration updates in a MIG.
Selective (opportunistic)
A selective update type is also known as an opportunistic update type. When you set the MIG's update type to opportunistic, the MIG applies new configurations to existing VMs only when you selectively target specific VMs to be updated.
Setting the MIG's update type to opportunistic offers the following advantages:
- You can select the VMs that you want to update.
- You can control the timing and the sequence of the updates.
- You can use the gcloud CLI or REST to update all instances immediately.
In certain scenarios, a selective update type is useful because you don't want to cause instability to the system if it can be avoided. For example, consider the following:
One of the VMs in your MIG goes down and needs to be repaired but you don't want its configuration to change. If you set the MIG's update type to opportunistic and you do not forcefully apply updates during repairs, then Compute Engine repairs the VM using the same configuration that was used to create that VM, even if the original instance template no longer exists.
You have an autoscaled MIG and you want to apply a non-critical update without any urgency. To ensure that Compute Engine does not tear down your existing VMs to apply the update, set the MIG's update type to opportunistic. When scaling in, the autoscaler preferentially terminates VMs with the old configuration. When the group scales out, it creates VMs with the latest configuration.
To learn how to set the MIG's update type, see Set up a proactive or an opportunistic update.
For more information about selectively updating VMs, see Selectively apply VM configuration updates in a MIG.
Re-creation of VMs
You can re-create any VM in a MIG. When you do, the MIG applies any updated configuration that has not yet been applied to that VM. For more information, see Re-creating VMs in a MIG.
Set up a proactive or an opportunistic update
To apply new configurations to existing VMs automatically, set the MIG's update type to "proactive". To apply new configurations to existing VMs only when you select a VM to be updated, set the MIG's update type to "opportunistic".
Use the Google Cloud console, the Google Cloud CLI, or REST.
Console
In the Google Cloud console, go to the Instance groups page.
Select the MIG that you want to update.
At the top of the page, click Update VMs.
To set a different template for the group, under New template, select the instance template that you want to use.
Under Update configuration, choose either automatic or selective update.
gcloud
Use the rolling-action start-update
command
and set the --type
flag to opportunistic
or proactive
.
gcloud compute instance-groups managed rolling-action start-update INSTANCE_GROUP_NAME \ --version=template=NEW_TEMPLATE \ --type=TYPE
You can also use the
beta update
command and include the --update-policy-type
flag.
gcloud beta compute instance-groups managed update INSTANCE_GROUP_NAME \ --update-policy-type=TYPE
Replace the following:
INSTANCE_GROUP_NAME
: the name of the groupNEW_TEMPLATE
: the name of the new template for the groupTYPE
: the type of update,opportunistic
orproactive
REST
Call the patch
method on a
zonal or
regional
MIG resource.
PATCH https://compute.googleapis.com/compute/v1/projects/PROJECT_ID/regions/REGION/instanceGroupManagers/INSTANCE_GROUP_NAME { "updatePolicy": { "type": "TYPE" # Choose an opportunistic or proactive update }, "versions": [{ "instanceTemplate": "global/instanceTemplates/NEW_TEMPLATE", }] }
Replace the following:
PROJECT_ID
: the project in which the MIG exists.REGION
: the region where your MIG is located. For a zonal MIG, replaceregions/REGION
withzones/ZONE
.INSTANCE_GROUP_NAME
: the name of the group.NEW_TEMPLATE
: the name of the new template for the group.TYPE
: the type of update,OPPORTUNISTIC
orPROACTIVE
.
To learn more about setting a new template and then applying that template to new and existing VMs in a MIG, see the following pages:
- Automatically apply VM configuration updates in a MIG
- Selectively apply VM configuration updates in a MIG
Check your group's update policy type
You can view your MIG's currently configured update policy type ("opportunistic" or "proactive") and other update policy settings by using the gcloud CLI or REST.
gcloud
Use the
describe
command
and include the --format
flag to only list the updatePolicy
settings.
gcloud beta compute instance-groups managed describe INSTANCE_GROUP_NAME \ --format="(updatePolicy)"
REST
Make a GET
request on a
zonal or
regional
MIG and check the updatePolicy
field.
GET https://compute.googleapis.com/compute/beta/projects/PROJECT_ID/regions/REGION/instanceGroupManagers/INSTANCE_GROUP_NAME
To change the policy type, see Set up a proactive or an opportunistic update.
Updates for suspended and stopped VMs
If you have suspended and stopped pools of VMs in a MIG, you can selectively (opportunistic) update suspended or stopped VMs like you update other running VMs. If you configure automatic (proactive) updates, the MIG updates the VMs in the following order:
- Running, suspended, and stopped VMs
- VMs with status
SUSPENDING
orSTOPPING
For an automatic update, the MIG calculates the maximum surge and maximum unavailable based on the target number of running VMs only, and doesn't consider the VMs in the standby pool.
If the automatic update requires replacing of VMs in the group, then the MIG does the following:
- Deletes the suspended and stopped VMs.
- Creates new VMs with the new instance template.
- Performs the initialization process.
- Suspends or stops the VMs.
If the automatic update requires only refreshing or restarting of VMs in the group, then the MIG does the following:
- Resumes or starts the VMs.
- Performs the update on the VMs when they are running.
- Performs the initialization process.
- Suspends or stops the VMs.
Canary updates
If you want to initiate canary updates in a MIG that has suspended or stopped VMs, the following applies:
- In the
manual
standby policy mode, the MIG updates only the running VMs based on the number or percentage of VMs to which you want to apply the update. The suspended and stopped VMs remain in the previous versions. - In the
scale-out-pool
standby policy mode, you cannot initiate a canary update in the MIG.
Relationship between versions
and instanceTemplate
fields
If you use REST, we recommend using the
instanceGroupManagers.versions
and regionInstanceGroupManagers.versions
fields to configure instance templates for zonal and regional MIGs.
The legacy instanceTemplate
field overlaps in functionality with the
versions
field because both fields let you specify which instance template the
MIG uses to create VMs. However, only the versions
field lets you
specify an advanced two-template (canary) configuration.
For backward compatibility, MIGs continue to support
setting the top-level instanceTemplate
field, even though we recommend
that you switch to using only the versions
field. Using both the top-level
instanceTemplate
field and the versions
field at the same time can lead to ambiguity and confusion.
If you specify both the instanceTemplate
field and the versions
field when
calling the update()
or patch()
method, there are three possible outcomes:
You set both fields to the same value.
This is a valid request. In this case, it creates no ambiguity, and the new instance template is applied to the MIG.
For example, in the following request, the top-level
instanceTemplate
and theversions
field specify the same instance template which is different from the existing current template, so the MIG is updated to the new instance template:{ "instanceTemplate": "global/instanceTemplates/NEW_TEMPLATE", "versions": [ { "instanceTemplate": "global/instanceTemplates/NEW_TEMPLATE" } ], "updatePolicy": { "type": "PROACTIVE" } }
You set both fields to values that don't match but only one value differs from the current instance template in the MIG.
This is a valid request. The field that's different from the current setting is taken as the intended value. For example, you call the
update()
method and supply both fields, but only one field is updated:{ "instanceTemplate": "global/instanceTemplates/CURRENT_TEMPLATE", "versions": [ { "instanceTemplate": "global/instanceTemplates/NEW_TEMPLATE" } ], "updatePolicy": { "type": "PROACTIVE" } }
You set both fields to values that don't match, and both values differ from the current instance template in the MIG.
This setting is invalid and returns an error because there is no clear intent.
{ "instanceTemplate": "global/instanceTemplates/NEW_TEMPLATE", "versions": [ { "instanceTemplate": "global/instanceTemplates/A_DIFFERENT_NEW_TEMPLATE" } ], "updatePolicy": { "type": "PROACTIVE" } }
The versions
field, instanceTemplate
field, and the get()
method
If you only specify one instance template, either through the top-level
instanceTemplate
field or through the versions
field or through both, the
get()
method returns both fields in its response. This makes the new
versions
field backward compatible. As long as you specify a single instance
template in either of these fields, there is no change to what the get()
method returns in the instanceTemplate
field.
If the versions
field has two instance templates specified, the get()
method
returns an empty top-level instanceTemplate
field. There is no way to
unambiguously express a canary, two-instance template configuration in
the top-level instanceTemplate
field, so the field is not used during a canary
update.
The versions
field and the setInstanceTemplate()
method
For backward compatibility, the setInstanceTemplate()
method behaves as it
has previously, letting you change the template the MIG
uses to create VMs. When you call this method, the
versions
field is overridden with the instance template specified by the
setInstanceTemplate()
method.
The setInstanceTemplate()
method also sets the updatePolicy
to
OPPORTUNISTIC
. This
prevents the MIG from actively deploying an instance template
that isn't explicitly specified in the versions
field.
What's next
- Learn more about automatically rolling out a new instance template to a MIG.
- Learn more about selectively updating VMs in a MIG.
- View information about your MIG and its VMs.