Automatically file a Jira ticket whenever a maintenance reminder event occurs. In this scenario, whenever a reminder for upcoming database maintenance comes from Oracle Cloud Infrastructure, a Jira ticket is created for the on-call engineer.
This scenario involves writing a function to file Jira tickets (and creating a secret to store Jira credentials), adding that function and optional email as subscriptions to a topic , and creating a rule that sends messages to that topic when maintenance reminder events occur (see Autonomous Container Database Event Types ). The message fans out to the topic's subscriptions, which includes a group email address in addition to the function. The function is invoked on receipt of the message.
Everything but the function can be set up in the Console. Alternatively, you can use the Oracle Cloud Infrastructure CLI or API, which lets you run the individual operations yourself.
Note
The Notifications service has no information about a function after it's invoked. For details, see the troubleshooting information in Function Not Invoked or Run.
To use Oracle Cloud Infrastructure, an administrator must be a member of a group granted security access in a policy by a tenancy administrator. This access is required whether you're using the Console or the REST API with an SDK, CLI, or other tool. If you get a message that you don't have permission or are unauthorized, verify with the tenancy administrator what type of access you have and which compartment your access works in.
If you're a member of the Administrators group, you already have the required access to execute this scenario. Otherwise, you need access to Events, Notifications, and Functions. You must have FN_INVOCATION permission against the function to be able to add the function as a subscription to a topic. To access your Jira credentials, the function must be authorized to read secrets. This scenario walks through steps to provide this authorization.
Open the navigation menu , select Identity & Security, and then select Vault.
Under List Scope, in the Compartment list, select the name of the compartment where you want to create a secret.
From the list of vaults in the compartment, do one of the following:
Select the name of the vault where you want to create a secret.
Create a new vault for the secret by following the instructions in To create a new vault, and then select the name of the vault.
Select Secrets, and then select Create Secret.
In the Create Secret panel, choose a compartment from the Create in Compartment list. (Secrets can exist outside the compartment the vault is in.)
Enter a Name to identify the secret. Avoid entering confidential information.
Example name: jira_auth_plain_text
Enter a brief Description of the secret to help identify it. Avoid entering confidential information.
Example description: jira_auth_plain_text
Choose the master encryption key that you want to use to encrypt the secret contents while they're imported to the vault. (The key must belong to the same vault.)
For Secret Type Template, select Plain-Text.
For Secret Contents, enter your Jira credentials in the following format, with a colon separating your login email from your auth token:
Note the secret OCID for use in your function code to securely fetch the secret.
Note
You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
Use the oci vault secret create-base64 command and required parameters to create a secret storing your Jira credentials:
For a complete list of parameters and values for CLI commands, see the CLI Command Reference.
Run the CreateSecret operation to create a secret.
Example:
POST /20180608/secrets
Host: <managementEndpoint><authorization and other headers>
{
"vaultId": "<vault_OCID>",
"compartmentId": "<compartment_OCID>",
"secretName": "jira_auth_plain_text",
"description": "jira_auth_plain_text",
"keyId": "<key_OCID>",
"secretContent":
{
"content": "<base64_encoded_secret_contents>",
"contentType": "BASE64"
}
}
Note
Each region has a unique endpoint for create, update, and list operations for secrets. This endpoint is referred to as the control plane URL or secret management endpoint. Each region also has a unique endpoint for operations related to retrieving secret contents. This endpoint is known as the data plane URL or the secret retrieval endpoint. For regional endpoints, see the API Documentation.
This section provides the code sample for creating your function and covers steps to authorize the function to access your Jira credentials in the secret created using the Vault service.
Use a dynamic group to grant your function the ability to read secrets. Your function must have this authorization to access your Jira credentials, which are stored in the secret you created earlier.
Grant the dynamic group access to secrets: Add the following policy
:
Copy
allow dynamic-group <dynamic-group-name> to read secret-family in tenancy
To authorize your function for access to other Oracle Cloud Infrastructure resources, such as compute instances, include the function in a dynamic group and create a policy to grant the dynamic group access to those resources. For more information, see Accessing Other Oracle Cloud Infrastructure Resources from Running Functions.
POST /20181201/topics
Host: notification.us-phoenix-1.oraclecloud.com
<authorization and other headers>
{
"name": "Maintenance Topic",
"compartmentId": "<compartment_OCID>"
}
Task 4: Create the Subscriptions 🔗
Your function must be deployed before creating the function subscription.
Select the topic that you created earlier (example name was Maintenance Topic): On the Topics list page, select the topic that you want to work with. If you need help finding the list page or the topic, see Listing Topics.
Create the function subscription.
Open the Create Subscription panel: In the detail page for the topic, select Create Subscription.
The Create Subscription panel opens.
For Protocol, select Function.
Fill in the remaining fields.
Field
Description
Function Compartment
Select the compartment containing the function.
Function Application
Select the application containing the function.
Function
Select the function.
Select Create.
No confirmation is needed for new function subscriptions.
Create the email subscription.
Open the Create Subscription panel: In the detail page for the topic, select Create Subscription.
This section walks through creating the rule that sends a message to the topic whenever the Database service emits an event for a database maintenance reminder.
Open the navigation menu and select Observability & Management. Under Events Service, select Rules.
Choose a Compartment you have permission to work in, and then select Create Rule.
Events compares the rules you create in this compartment to event messages emitted from resources in this compartment and any child compartments.
Enter the following.
Display Name: Specify a friendly name for the rule. You can change this name later. Avoid entering confidential information.
Example: Maintenance Reminder
Description: Specify a description of what the rule does. You can change this description later. Avoid entering confidential information.
Example: Sends messages to Maintenance Topic
In Rule Conditions, create a filter for database reminder events:
For Service Name, select Database.
In Event type, select Autonomous Container Database – Maintenance Reminder.
In Actions, select the topic you previously created:
Select Notifications.
Select the Notifications Compartment.
Select the Topic that you previously created.
Select Create Rule.
Create a rule that's triggered by maintenance reminders and references this topic as the destination.
Create a file, action.json, that contains the following, referencing your topic created previously.