added example-projects
This commit is contained in:
parent
ba80260324
commit
4c2da97e78
@ -1,241 +0,0 @@
|
||||
import boto3
|
||||
from botocore.exceptions import ClientError
|
||||
|
||||
region = 'eu-central-1'
|
||||
availabilityZone = 'eu-central-1b'
|
||||
imageId = 'ami-0cc293023f983ed53'
|
||||
instanceType = 't3.nano'
|
||||
keyName = 'srieger-pub'
|
||||
userData = ('#!/bin/bash\n'
|
||||
'COTURN_VERSION="4.5.1.1"\n'
|
||||
'LIBEVENT_VERSION="2.0.21"\n'
|
||||
'\n'
|
||||
'# extra repo for RedHat rpms\n'
|
||||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
||||
'# essential tools\n'
|
||||
'yum install -y joe htop git\n'
|
||||
'# coturn requirements\n'
|
||||
'yum install -y gcc openssl-devel\n'
|
||||
'yum install -y sqlite-devel mysql-devel hiredis-devel mongo-c-driver-devel\n'
|
||||
'\n'
|
||||
'### libevent installation ###\n'
|
||||
'wget https://github.com/downloads/libevent/libevent/libevent-$LIBEVENT_VERSION-stable.tar.gz\n'
|
||||
'\n'
|
||||
'tar xvfz libevent-$LIBEVENT_VERSION-stable.tar.gz\n'
|
||||
'cd libevent-$LIBEVENT_VERSION-stable\n'
|
||||
'./configure\n'
|
||||
'make\n'
|
||||
'make install\n'
|
||||
'\n'
|
||||
'### turnserver installation ###\n'
|
||||
'wget https://coturn.net/turnserver/v$COTURN_VERSION/turnserver-$COTURN_VERSION.tar.gz\n'
|
||||
'tar xvfz turnserver-$COTURN_VERSION.tar.gz\n'
|
||||
'cd turnserver-$COTURN_VERSION\n'
|
||||
'./configure\n'
|
||||
'make\n'
|
||||
'make install\n'
|
||||
'\n'
|
||||
'openssl req -new -subj "/CN=coturn" -newkey rsa:4096 -x509 -sha256 -days 365 -nodes -out /usr/local/etc/turn_server_cert.pem -keyout /usr/local/etc/turn_server_pkey.pem\n'
|
||||
'\n'
|
||||
'/usr/local/bin/turnadmin -a -u srieger -r hs-fulda.de -p coturnserver2019\n'
|
||||
'/usr/local/bin/turnadmin -A -u srieger -p coturnserver2019\n'
|
||||
'\n'
|
||||
'MAC_ETH0=$(cat /sys/class/net/eth0/address)\n'
|
||||
'MAC_ETH1=$(cat /sys/class/net/eth1/address)\n'
|
||||
'LOCAL_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/local-ipv4s)\n'
|
||||
'LOCAL_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/local-ipv4s)\n'
|
||||
'PUBLIC_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/public-ipv4s)\n'
|
||||
'PUBLIC_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/public-ipv4s)\n'
|
||||
'\n'
|
||||
'cat <<EOF > /usr/local/etc/turnserver.conf\n'
|
||||
'verbose\n'
|
||||
'listening-ip=$LOCAL_IPV4S_ETH0\n'
|
||||
'listening-ip=$LOCAL_IPV4S_ETH1\n'
|
||||
'relay-ip=$LOCAL_IPV4S_ETH0\n'
|
||||
'relay-ip=$LOCAL_IPV4S_ETH1\n'
|
||||
'external-ip=$PUBLIC_IPV4S_ETH0/$LOCAL_IPV4S_ETH0\n'
|
||||
'external-ip=$PUBLIC_IPV4S_ETH1/$LOCAL_IPV4S_ETH1\n'
|
||||
'fingerprint\n'
|
||||
'lt-cred-mech\n'
|
||||
'#use-auth-secret\n'
|
||||
'#static-auth-secret=751c45cae60a2839711a94c8d6bf0089e78b2149ca602fdXXXXXXXXXXXXXXXXX\n'
|
||||
'realm=hs-fulda.de\n'
|
||||
'total-quota=100\n'
|
||||
'stale-nonce\n'
|
||||
'cipher-list="ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AES:RSA+3DES:!ADH:!AECDH:!MD5"\n'
|
||||
'#no-stun\n'
|
||||
'#no-loopback-peers\n'
|
||||
'#no-multicast-peers\n'
|
||||
'cli-password=coturnserver2019\n'
|
||||
'web-admin\n'
|
||||
'web-admin-ip=$LOCAL_IPV4S_ETH0\n'
|
||||
'EOF\n'
|
||||
'\n'
|
||||
'/usr/local/bin/turnserver\n'
|
||||
)
|
||||
|
||||
# convert with: cat install-coturn | sed "s/^/'/; s/$/\\\n'/"
|
||||
|
||||
client = boto3.setup_default_session(region_name=region)
|
||||
ec2Client = boto3.client("ec2")
|
||||
ec2Resource = boto3.resource('ec2')
|
||||
|
||||
response = ec2Client.describe_vpcs()
|
||||
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
||||
subnet_id = ec2Client.describe_subnets(
|
||||
Filters=[
|
||||
{
|
||||
'Name': 'availability-zone', 'Values': [availabilityZone]
|
||||
}
|
||||
])['Subnets'][0]['SubnetId']
|
||||
|
||||
print("Deleting old instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
||||
print(response)
|
||||
reservations = response['Reservations']
|
||||
for reservation in reservations:
|
||||
for instance in reservation['Instances']:
|
||||
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending":
|
||||
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
|
||||
print(response)
|
||||
instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
|
||||
instanceToTerminate.wait_until_terminated()
|
||||
|
||||
print("Delete old security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.delete_security_group(GroupName='coturn')
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Delete old elastic ips...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.describe_addresses(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
||||
addresses = response['Addresses']
|
||||
for address in addresses:
|
||||
ec2Client.release_address(AllocationId=address['AllocationId'])
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Create security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.create_security_group(GroupName='coturn',
|
||||
Description='coturn',
|
||||
VpcId=vpc_id)
|
||||
security_group_id = response['GroupId']
|
||||
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
|
||||
|
||||
data = ec2Client.authorize_security_group_ingress(
|
||||
GroupId=security_group_id,
|
||||
IpPermissions=[
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 3478,
|
||||
'ToPort': 3478,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'udp',
|
||||
'FromPort': 3478,
|
||||
'ToPort': 3478,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 5349,
|
||||
'ToPort': 5349,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'udp',
|
||||
'FromPort': 5349,
|
||||
'ToPort': 5349,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 8080,
|
||||
'ToPort': 8080,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'udp',
|
||||
'FromPort': 49152,
|
||||
'ToPort': 65535,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 22,
|
||||
'ToPort': 22,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}
|
||||
])
|
||||
print('Ingress Successfully Set %s' % data)
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Allocate additional elastic ips...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.allocate_address(
|
||||
Domain='vpc',
|
||||
)
|
||||
firstIpAddressAllocationId = response['AllocationId']
|
||||
ec2Client.create_tags(Resources=[firstIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}])
|
||||
|
||||
response = ec2Client.allocate_address(
|
||||
Domain='vpc',
|
||||
)
|
||||
secondIpAddressAllocationId = response['AllocationId']
|
||||
ec2Client.create_tags(Resources=[secondIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}])
|
||||
|
||||
print("Running new instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.run_instances(
|
||||
ImageId=imageId,
|
||||
InstanceType=instanceType,
|
||||
Placement={'AvailabilityZone': availabilityZone, },
|
||||
KeyName=keyName,
|
||||
MinCount=1,
|
||||
MaxCount=1,
|
||||
UserData=userData,
|
||||
NetworkInterfaces=[
|
||||
{
|
||||
'DeviceIndex': 0,
|
||||
'Groups': [
|
||||
security_group_id,
|
||||
],
|
||||
'SubnetId': subnet_id,
|
||||
},
|
||||
{
|
||||
'DeviceIndex': 1,
|
||||
'Groups': [
|
||||
security_group_id,
|
||||
],
|
||||
'SubnetId': subnet_id,
|
||||
},
|
||||
],
|
||||
TagSpecifications=[
|
||||
{
|
||||
'ResourceType': 'instance',
|
||||
'Tags': [
|
||||
{'Key': 'coturn', 'Value': 'installed'}
|
||||
],
|
||||
}
|
||||
],
|
||||
)
|
||||
|
||||
instanceId = response['Instances'][0]['InstanceId']
|
||||
firstNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
||||
secondNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][1]['NetworkInterfaceId']
|
||||
|
||||
instance = ec2Resource.Instance(instanceId)
|
||||
instance.wait_until_running()
|
||||
|
||||
response = ec2Client.associate_address(
|
||||
AllocationId=firstIpAddressAllocationId,
|
||||
NetworkInterfaceId=firstNetworkInterfaceId,
|
||||
)
|
||||
response = ec2Client.associate_address(
|
||||
AllocationId=secondIpAddressAllocationId,
|
||||
NetworkInterfaceId=secondNetworkInterfaceId,
|
||||
)
|
||||
|
||||
|
||||
print(instanceId)
|
||||
|
Before Width: | Height: | Size: 299 KiB After Width: | Height: | Size: 299 KiB |
File diff suppressed because it is too large
Load Diff
@ -1,394 +1,394 @@
|
||||
{
|
||||
"AWSTemplateFormatVersion": "2010-09-09",
|
||||
"Parameters": {
|
||||
"paramImageID": {
|
||||
"Type": "AWS::EC2::Image::Id",
|
||||
"Default": "ami-f573e19a",
|
||||
"Description": "Amazon Image ID"
|
||||
},
|
||||
"paramInstanceType": {
|
||||
"Type": "String",
|
||||
"Default": "t2.nano",
|
||||
"AllowedValues": [
|
||||
"t2.nano",
|
||||
"t2.micro",
|
||||
"m1.small"
|
||||
],
|
||||
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro."
|
||||
},
|
||||
"paramKeyPair": {
|
||||
"Type": "AWS::EC2::KeyPair::KeyName",
|
||||
"Description": "Amazon EC2 Key Pair"
|
||||
},
|
||||
"paramIamInstanceRole": {
|
||||
"Type": "String",
|
||||
"Default": "ec2-s3-vertsys-access-role",
|
||||
"Description": "IAM Instance Role"
|
||||
},
|
||||
"paramVPC": {
|
||||
"Type": "AWS::EC2::VPC::Id",
|
||||
"Description": "VPC"
|
||||
},
|
||||
"paramSubnetIDs": {
|
||||
"Type": "List<AWS::EC2::Subnet::Id>",
|
||||
"Description": "Subnet IDs"
|
||||
},
|
||||
"paramAvailabilityZones": {
|
||||
"Type": "List<AWS::EC2::AvailabilityZone::Name>",
|
||||
"Description": "AvailabilityZones"
|
||||
}
|
||||
},
|
||||
"Resources": {
|
||||
"lcVertSysAutoScaleConfigv11": {
|
||||
"Type": "AWS::AutoScaling::LaunchConfiguration",
|
||||
"Properties": {
|
||||
"AssociatePublicIpAddress": true,
|
||||
"ImageId": {
|
||||
"Ref": "paramImageID"
|
||||
},
|
||||
"InstanceType": {
|
||||
"Ref": "paramInstanceType"
|
||||
},
|
||||
"KeyName": {
|
||||
"Ref": "paramKeyPair"
|
||||
},
|
||||
"IamInstanceProfile": {
|
||||
"Ref": "paramIamInstanceRole"
|
||||
},
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"UserData": {
|
||||
"Fn::Base64": {
|
||||
"Fn::Join": [
|
||||
"",
|
||||
[
|
||||
"#!/bin/bash\n",
|
||||
"\n",
|
||||
"# this script will be run during the boot process by each VertSys instance created\n",
|
||||
"# in AWS currently this is a plain bash script that requires a RedHat based image\n",
|
||||
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n",
|
||||
"# distros\n",
|
||||
"#\n",
|
||||
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n",
|
||||
"\n",
|
||||
"# Config\n",
|
||||
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n",
|
||||
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n",
|
||||
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n",
|
||||
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n",
|
||||
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n",
|
||||
"\n",
|
||||
"# Create path to run the script\n",
|
||||
"mkdir $SCRIPT_ROOT_PATH\n",
|
||||
"cd $SCRIPT_ROOT_PATH\n",
|
||||
"\n",
|
||||
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n",
|
||||
"wget http://169.254.169.254/latest/user-data\n",
|
||||
"chmod +x user-data\n",
|
||||
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n",
|
||||
"\n",
|
||||
"# setting console prompt to include location (availability zone and region in AWS)\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n",
|
||||
"\n",
|
||||
"# wait for internet connection, should not be necessary, but just in case ;)\n",
|
||||
"while ! ping -c 1 -W 1 8.8.8.8; do\n",
|
||||
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n",
|
||||
" sleep 1\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# installation of required packages\n",
|
||||
"echo \"Installing packages...\"\n",
|
||||
"sudo yum update -y\n",
|
||||
"sudo yum install -y java git\n",
|
||||
"#rm -rf verteilte-systeme-bsc-ai-examples\n",
|
||||
"if [ ! -d $VERTSYS_PATH ]; then\n",
|
||||
" echo \"Cloning repo...\"\n",
|
||||
" git clone $REPO\n",
|
||||
"fi\n",
|
||||
"\n",
|
||||
"# killall running screens, .e.g to cleanup if script is run again after boot\n",
|
||||
"killall screen\n",
|
||||
"# start all jars\n",
|
||||
"echo \"Starting JARS: ${JARS}...\"\n",
|
||||
"for JAR in $JARS; do\n",
|
||||
" echo \"Starting ${JAR}...\"\n",
|
||||
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# wait a second, to allow java services to start\n",
|
||||
"sleep 1\n",
|
||||
"\n",
|
||||
"# output status of ports 36000-36199 and all running processes\n",
|
||||
"echo \"Status:\"\n",
|
||||
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n",
|
||||
"sudo ps aux | grep java\n",
|
||||
"\n",
|
||||
"# Example for path and contents:\n",
|
||||
"#\n",
|
||||
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n",
|
||||
"#\n",
|
||||
"#build-server-jars.xml TCPServerMulti.jar\n",
|
||||
"#RMIEchoServer.jar UDPServer.jar\n",
|
||||
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n",
|
||||
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n",
|
||||
"#TCPServer.jar\n"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"sgCloudCompDemoSecurityGroup": {
|
||||
"Type": "AWS::EC2::SecurityGroup",
|
||||
"Properties": {
|
||||
"GroupDescription": "CloudComp Counter Demo",
|
||||
"VpcId": {
|
||||
"Ref": "paramVPC"
|
||||
}
|
||||
}
|
||||
},
|
||||
"ingress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress2": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "22",
|
||||
"ToPort": "22",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress3": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "udp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"egress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupEgress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "-1",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"asgCloudCompAutoScaleGroup": {
|
||||
"Type": "AWS::AutoScaling::AutoScalingGroup",
|
||||
"Properties": {
|
||||
"AvailabilityZones": {
|
||||
"Ref": "paramAvailabilityZones"
|
||||
},
|
||||
"TargetGroupARNs": [
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
],
|
||||
"Cooldown": "30",
|
||||
"DesiredCapacity": "1",
|
||||
"HealthCheckGracePeriod": "60",
|
||||
"HealthCheckType": "EC2",
|
||||
"MaxSize": "3",
|
||||
"MinSize": "1",
|
||||
"VPCZoneIdentifier": {
|
||||
"Ref": "paramSubnetIDs"
|
||||
},
|
||||
"LaunchConfigurationName": {
|
||||
"Ref": "lcVertSysAutoScaleConfigv11"
|
||||
},
|
||||
"MetricsCollection": [
|
||||
{
|
||||
"Granularity": "1Minute",
|
||||
"Metrics": [
|
||||
"GroupPendingInstances",
|
||||
"GroupMinSize",
|
||||
"GroupDesiredCapacity",
|
||||
"GroupTerminatingInstances",
|
||||
"GroupInServiceInstances",
|
||||
"GroupStandbyInstances",
|
||||
"GroupMaxSize",
|
||||
"GroupTotalInstances"
|
||||
]
|
||||
}
|
||||
],
|
||||
"TerminationPolicies": [
|
||||
"Default"
|
||||
]
|
||||
}
|
||||
},
|
||||
"sgCloudCompScalePolicy": {
|
||||
"Type": "AWS::AutoScaling::ScalingPolicy",
|
||||
"DependsOn": "elbCloudCompListener",
|
||||
"Properties": {
|
||||
"PolicyType": "TargetTrackingScaling",
|
||||
"EstimatedInstanceWarmup": 60,
|
||||
"TargetTrackingConfiguration": {
|
||||
"DisableScaleIn": false,
|
||||
"TargetValue": 5,
|
||||
"PredefinedMetricSpecification": {
|
||||
"PredefinedMetricType": "ALBRequestCountPerTarget",
|
||||
"ResourceLabel": {
|
||||
"Fn::Join": [
|
||||
"/",
|
||||
[
|
||||
"app/elbCloudCompLoadBalancer",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"3",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"targetgroup/elbCloudCompTargetGroup",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"2",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"AutoScalingGroupName": {
|
||||
"Ref": "asgCloudCompAutoScaleGroup"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompLoadBalancer": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer",
|
||||
"Properties": {
|
||||
"Name": "elbCloudCompLoadBalancer",
|
||||
"IpAddressType": "ipv4",
|
||||
"Type": "application",
|
||||
"Scheme": "internet-facing",
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"Subnets": {
|
||||
"Ref": "paramSubnetIDs"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompTargetGroup": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup",
|
||||
"Properties": {
|
||||
"Port": 36042,
|
||||
"HealthCheckIntervalSeconds": 30,
|
||||
"HealthCheckTimeoutSeconds": 5,
|
||||
"HealthyThresholdCount": 2,
|
||||
"UnhealthyThresholdCount": 2,
|
||||
"HealthCheckPath": "/counter",
|
||||
"HealthCheckProtocol": "HTTP",
|
||||
"TargetGroupAttributes": [
|
||||
{
|
||||
"Key": "deregistration_delay.timeout_seconds",
|
||||
"Value": "20"
|
||||
}
|
||||
],
|
||||
"Protocol": "HTTP",
|
||||
"TargetType": "instance",
|
||||
"Matcher": {
|
||||
"HttpCode": "200"
|
||||
},
|
||||
"Name": "elbCloudCompTargetGroup",
|
||||
"VpcId": {
|
||||
"Ref": "paramVPC"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompListener": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::Listener",
|
||||
"Properties": {
|
||||
"LoadBalancerArn": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
},
|
||||
"Protocol": "HTTP",
|
||||
"Port": 36042,
|
||||
"DefaultActions": [
|
||||
{
|
||||
"Type": "forward",
|
||||
"TargetGroupArn": {
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Outputs": {
|
||||
"LoadBalancer": {
|
||||
"Description": "Load Balancer",
|
||||
"Value": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
},
|
||||
"LoadBalancerDns": {
|
||||
"Description": "Load Balancer DNS",
|
||||
"Value": {
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
}
|
||||
},
|
||||
"LoadBalancerURL": {
|
||||
"Description": "Load Balancer URL",
|
||||
"Value": {
|
||||
"Fn::Join": [
|
||||
":",
|
||||
[
|
||||
{
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
},
|
||||
"36042/counter"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Description": "CloudComp Counter Demo"
|
||||
{
|
||||
"AWSTemplateFormatVersion": "2010-09-09",
|
||||
"Parameters": {
|
||||
"paramImageID": {
|
||||
"Type": "AWS::EC2::Image::Id",
|
||||
"Default": "ami-f573e19a",
|
||||
"Description": "Amazon Image ID"
|
||||
},
|
||||
"paramInstanceType": {
|
||||
"Type": "String",
|
||||
"Default": "t2.nano",
|
||||
"AllowedValues": [
|
||||
"t2.nano",
|
||||
"t2.micro",
|
||||
"m1.small"
|
||||
],
|
||||
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro."
|
||||
},
|
||||
"paramKeyPair": {
|
||||
"Type": "AWS::EC2::KeyPair::KeyName",
|
||||
"Description": "Amazon EC2 Key Pair"
|
||||
},
|
||||
"paramIamInstanceRole": {
|
||||
"Type": "String",
|
||||
"Default": "ec2-s3-vertsys-access-role",
|
||||
"Description": "IAM Instance Role"
|
||||
},
|
||||
"paramVPC": {
|
||||
"Type": "AWS::EC2::VPC::Id",
|
||||
"Description": "VPC"
|
||||
},
|
||||
"paramSubnetIDs": {
|
||||
"Type": "List<AWS::EC2::Subnet::Id>",
|
||||
"Description": "Subnet IDs"
|
||||
},
|
||||
"paramAvailabilityZones": {
|
||||
"Type": "List<AWS::EC2::AvailabilityZone::Name>",
|
||||
"Description": "AvailabilityZones"
|
||||
}
|
||||
},
|
||||
"Resources": {
|
||||
"lcVertSysAutoScaleConfigv11": {
|
||||
"Type": "AWS::AutoScaling::LaunchConfiguration",
|
||||
"Properties": {
|
||||
"AssociatePublicIpAddress": true,
|
||||
"ImageId": {
|
||||
"Ref": "paramImageID"
|
||||
},
|
||||
"InstanceType": {
|
||||
"Ref": "paramInstanceType"
|
||||
},
|
||||
"KeyName": {
|
||||
"Ref": "paramKeyPair"
|
||||
},
|
||||
"IamInstanceProfile": {
|
||||
"Ref": "paramIamInstanceRole"
|
||||
},
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"UserData": {
|
||||
"Fn::Base64": {
|
||||
"Fn::Join": [
|
||||
"",
|
||||
[
|
||||
"#!/bin/bash\n",
|
||||
"\n",
|
||||
"# this script will be run during the boot process by each VertSys instance created\n",
|
||||
"# in AWS currently this is a plain bash script that requires a RedHat based image\n",
|
||||
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n",
|
||||
"# distros\n",
|
||||
"#\n",
|
||||
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n",
|
||||
"\n",
|
||||
"# Config\n",
|
||||
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n",
|
||||
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n",
|
||||
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n",
|
||||
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n",
|
||||
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n",
|
||||
"\n",
|
||||
"# Create path to run the script\n",
|
||||
"mkdir $SCRIPT_ROOT_PATH\n",
|
||||
"cd $SCRIPT_ROOT_PATH\n",
|
||||
"\n",
|
||||
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n",
|
||||
"wget http://169.254.169.254/latest/user-data\n",
|
||||
"chmod +x user-data\n",
|
||||
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n",
|
||||
"\n",
|
||||
"# setting console prompt to include location (availability zone and region in AWS)\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n",
|
||||
"\n",
|
||||
"# wait for internet connection, should not be necessary, but just in case ;)\n",
|
||||
"while ! ping -c 1 -W 1 8.8.8.8; do\n",
|
||||
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n",
|
||||
" sleep 1\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# installation of required packages\n",
|
||||
"echo \"Installing packages...\"\n",
|
||||
"sudo yum update -y\n",
|
||||
"sudo yum install -y java git\n",
|
||||
"#rm -rf verteilte-systeme-bsc-ai-examples\n",
|
||||
"if [ ! -d $VERTSYS_PATH ]; then\n",
|
||||
" echo \"Cloning repo...\"\n",
|
||||
" git clone $REPO\n",
|
||||
"fi\n",
|
||||
"\n",
|
||||
"# killall running screens, .e.g to cleanup if script is run again after boot\n",
|
||||
"killall screen\n",
|
||||
"# start all jars\n",
|
||||
"echo \"Starting JARS: ${JARS}...\"\n",
|
||||
"for JAR in $JARS; do\n",
|
||||
" echo \"Starting ${JAR}...\"\n",
|
||||
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# wait a second, to allow java services to start\n",
|
||||
"sleep 1\n",
|
||||
"\n",
|
||||
"# output status of ports 36000-36199 and all running processes\n",
|
||||
"echo \"Status:\"\n",
|
||||
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n",
|
||||
"sudo ps aux | grep java\n",
|
||||
"\n",
|
||||
"# Example for path and contents:\n",
|
||||
"#\n",
|
||||
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n",
|
||||
"#\n",
|
||||
"#build-server-jars.xml TCPServerMulti.jar\n",
|
||||
"#RMIEchoServer.jar UDPServer.jar\n",
|
||||
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n",
|
||||
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n",
|
||||
"#TCPServer.jar\n"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"sgCloudCompDemoSecurityGroup": {
|
||||
"Type": "AWS::EC2::SecurityGroup",
|
||||
"Properties": {
|
||||
"GroupDescription": "CloudComp Counter Demo",
|
||||
"VpcId": {
|
||||
"Ref": "paramVPC"
|
||||
}
|
||||
}
|
||||
},
|
||||
"ingress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress2": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "22",
|
||||
"ToPort": "22",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress3": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "udp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"egress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupEgress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "-1",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"asgCloudCompAutoScaleGroup": {
|
||||
"Type": "AWS::AutoScaling::AutoScalingGroup",
|
||||
"Properties": {
|
||||
"AvailabilityZones": {
|
||||
"Ref": "paramAvailabilityZones"
|
||||
},
|
||||
"TargetGroupARNs": [
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
],
|
||||
"Cooldown": "30",
|
||||
"DesiredCapacity": "1",
|
||||
"HealthCheckGracePeriod": "60",
|
||||
"HealthCheckType": "EC2",
|
||||
"MaxSize": "3",
|
||||
"MinSize": "1",
|
||||
"VPCZoneIdentifier": {
|
||||
"Ref": "paramSubnetIDs"
|
||||
},
|
||||
"LaunchConfigurationName": {
|
||||
"Ref": "lcVertSysAutoScaleConfigv11"
|
||||
},
|
||||
"MetricsCollection": [
|
||||
{
|
||||
"Granularity": "1Minute",
|
||||
"Metrics": [
|
||||
"GroupPendingInstances",
|
||||
"GroupMinSize",
|
||||
"GroupDesiredCapacity",
|
||||
"GroupTerminatingInstances",
|
||||
"GroupInServiceInstances",
|
||||
"GroupStandbyInstances",
|
||||
"GroupMaxSize",
|
||||
"GroupTotalInstances"
|
||||
]
|
||||
}
|
||||
],
|
||||
"TerminationPolicies": [
|
||||
"Default"
|
||||
]
|
||||
}
|
||||
},
|
||||
"sgCloudCompScalePolicy": {
|
||||
"Type": "AWS::AutoScaling::ScalingPolicy",
|
||||
"DependsOn": "elbCloudCompListener",
|
||||
"Properties": {
|
||||
"PolicyType": "TargetTrackingScaling",
|
||||
"EstimatedInstanceWarmup": 60,
|
||||
"TargetTrackingConfiguration": {
|
||||
"DisableScaleIn": false,
|
||||
"TargetValue": 5,
|
||||
"PredefinedMetricSpecification": {
|
||||
"PredefinedMetricType": "ALBRequestCountPerTarget",
|
||||
"ResourceLabel": {
|
||||
"Fn::Join": [
|
||||
"/",
|
||||
[
|
||||
"app/elbCloudCompLoadBalancer",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"3",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"targetgroup/elbCloudCompTargetGroup",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"2",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"AutoScalingGroupName": {
|
||||
"Ref": "asgCloudCompAutoScaleGroup"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompLoadBalancer": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer",
|
||||
"Properties": {
|
||||
"Name": "elbCloudCompLoadBalancer",
|
||||
"IpAddressType": "ipv4",
|
||||
"Type": "application",
|
||||
"Scheme": "internet-facing",
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"Subnets": {
|
||||
"Ref": "paramSubnetIDs"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompTargetGroup": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup",
|
||||
"Properties": {
|
||||
"Port": 36042,
|
||||
"HealthCheckIntervalSeconds": 30,
|
||||
"HealthCheckTimeoutSeconds": 5,
|
||||
"HealthyThresholdCount": 2,
|
||||
"UnhealthyThresholdCount": 2,
|
||||
"HealthCheckPath": "/counter",
|
||||
"HealthCheckProtocol": "HTTP",
|
||||
"TargetGroupAttributes": [
|
||||
{
|
||||
"Key": "deregistration_delay.timeout_seconds",
|
||||
"Value": "20"
|
||||
}
|
||||
],
|
||||
"Protocol": "HTTP",
|
||||
"TargetType": "instance",
|
||||
"Matcher": {
|
||||
"HttpCode": "200"
|
||||
},
|
||||
"Name": "elbCloudCompTargetGroup",
|
||||
"VpcId": {
|
||||
"Ref": "paramVPC"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompListener": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::Listener",
|
||||
"Properties": {
|
||||
"LoadBalancerArn": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
},
|
||||
"Protocol": "HTTP",
|
||||
"Port": 36042,
|
||||
"DefaultActions": [
|
||||
{
|
||||
"Type": "forward",
|
||||
"TargetGroupArn": {
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Outputs": {
|
||||
"LoadBalancer": {
|
||||
"Description": "Load Balancer",
|
||||
"Value": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
},
|
||||
"LoadBalancerDns": {
|
||||
"Description": "Load Balancer DNS",
|
||||
"Value": {
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
}
|
||||
},
|
||||
"LoadBalancerURL": {
|
||||
"Description": "Load Balancer URL",
|
||||
"Value": {
|
||||
"Fn::Join": [
|
||||
":",
|
||||
[
|
||||
{
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
},
|
||||
"36042/counter"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Description": "CloudComp Counter Demo"
|
||||
}
|
184
example-projects/tug-of-war-in-the-clouds/start.py
Normal file
184
example-projects/tug-of-war-in-the-clouds/start.py
Normal file
@ -0,0 +1,184 @@
|
||||
import boto3
|
||||
from botocore.exceptions import ClientError
|
||||
|
||||
region = 'eu-central-1'
|
||||
availabilityZone = 'eu-central-1b'
|
||||
imageId = 'ami-0cc293023f983ed53'
|
||||
instanceType = 't3.nano'
|
||||
keyName = 'srieger-pub'
|
||||
userDataDB = ('#!/bin/bash\n'
|
||||
'#!/bin/bash\n'
|
||||
'# extra repo for RedHat rpms\n'
|
||||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
||||
'# essential tools\n'
|
||||
'yum install -y joe htop git\n'
|
||||
'# mysql\n'
|
||||
'yum install -y mariadb mariadb-server\n'
|
||||
'\n'
|
||||
'service mariadb start\n'
|
||||
'\n'
|
||||
'echo "create database cloud_tug_of_war" | mysql -u root\n'
|
||||
'\n'
|
||||
'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n'
|
||||
'\n'
|
||||
'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloud\';" | mysql -u root\n'
|
||||
'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n'
|
||||
'echo "FLUSH PRIVILEGES" | mysql -u root\n'
|
||||
)
|
||||
|
||||
# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/"
|
||||
|
||||
client = boto3.setup_default_session(region_name=region)
|
||||
ec2Client = boto3.client("ec2")
|
||||
ec2Resource = boto3.resource('ec2')
|
||||
|
||||
response = ec2Client.describe_vpcs()
|
||||
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
||||
subnet_id = ec2Client.describe_subnets(
|
||||
Filters=[
|
||||
{
|
||||
'Name': 'availability-zone', 'Values': [availabilityZone]
|
||||
}
|
||||
])['Subnets'][0]['SubnetId']
|
||||
|
||||
print("Deleting old instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}])
|
||||
print(response)
|
||||
reservations = response['Reservations']
|
||||
for reservation in reservations:
|
||||
for instance in reservation['Instances']:
|
||||
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending":
|
||||
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
|
||||
print(response)
|
||||
instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
|
||||
instanceToTerminate.wait_until_terminated()
|
||||
|
||||
print("Delete old security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.delete_security_group(GroupName='tug-of-war')
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Create security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.create_security_group(GroupName='tug-of-war',
|
||||
Description='tug-of-war',
|
||||
VpcId=vpc_id)
|
||||
security_group_id = response['GroupId']
|
||||
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
|
||||
|
||||
data = ec2Client.authorize_security_group_ingress(
|
||||
GroupId=security_group_id,
|
||||
IpPermissions=[
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 3306,
|
||||
'ToPort': 3306,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 22,
|
||||
'ToPort': 22,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 80,
|
||||
'ToPort': 80,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 443,
|
||||
'ToPort': 443,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}
|
||||
])
|
||||
print('Ingress Successfully Set %s' % data)
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Running new DB instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.run_instances(
|
||||
ImageId=imageId,
|
||||
InstanceType=instanceType,
|
||||
Placement={'AvailabilityZone': availabilityZone, },
|
||||
KeyName=keyName,
|
||||
MinCount=1,
|
||||
MaxCount=1,
|
||||
UserData=userDataDB,
|
||||
SecurityGroupIds=[
|
||||
security_group_id,
|
||||
],
|
||||
TagSpecifications=[
|
||||
{
|
||||
'ResourceType': 'instance',
|
||||
'Tags': [
|
||||
{'Key': 'Name', 'Value': 'tug-of-war-db1'},
|
||||
{'Key': 'tug-of-war', 'Value': 'installed'}
|
||||
],
|
||||
}
|
||||
],
|
||||
)
|
||||
|
||||
instanceIdDB = response['Instances'][0]['InstanceId']
|
||||
privateIpDB = response['Instances'][0]['PrivateIpAddress']
|
||||
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
||||
|
||||
instance = ec2Resource.Instance(instanceIdDB)
|
||||
instance.wait_until_running()
|
||||
|
||||
print(instanceIdDB)
|
||||
|
||||
userDataWebServer = ('#!/bin/bash\n'
|
||||
'# extra repo for RedHat rpms\n'
|
||||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
||||
'# essential tools\n'
|
||||
'yum install -y joe htop git\n'
|
||||
'# mysql\n'
|
||||
'yum install -y httpd php php-mysql\n'
|
||||
'\n'
|
||||
'service httpd start\n'
|
||||
'\n'
|
||||
'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n'
|
||||
'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n'
|
||||
'cd /var/www/html\n'
|
||||
'tar zxvf tug-of-war-in-the-clouds.tar.gz\n'
|
||||
'\n'
|
||||
'# change hostname of db connection\n'
|
||||
'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n'
|
||||
)
|
||||
|
||||
print("Running new Web Server instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.run_instances(
|
||||
ImageId=imageId,
|
||||
InstanceType=instanceType,
|
||||
Placement={'AvailabilityZone': availabilityZone, },
|
||||
KeyName=keyName,
|
||||
MinCount=1,
|
||||
MaxCount=1,
|
||||
UserData=userDataWebServer,
|
||||
SecurityGroupIds=[
|
||||
security_group_id,
|
||||
],
|
||||
|
||||
TagSpecifications=[
|
||||
{
|
||||
'ResourceType': 'instance',
|
||||
'Tags': [
|
||||
{'Key': 'Name', 'Value': 'tug-of-war-webserver1'},
|
||||
{'Key': 'tug-of-war', 'Value': 'installed'}
|
||||
],
|
||||
}
|
||||
],
|
||||
)
|
||||
|
||||
instanceIdDB = response['Instances'][0]['InstanceId']
|
||||
privateIpDB = response['Instances'][0]['PrivateIpAddress']
|
||||
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
||||
|
||||
instance = ec2Resource.Instance(instanceIdDB)
|
||||
instance.wait_until_running()
|
@ -13,7 +13,7 @@ vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
||||
print("Deleting old instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}])
|
||||
print(response)
|
||||
reservations = response['Reservations']
|
||||
for reservation in reservations:
|
||||
@ -28,18 +28,6 @@ print("Delete old security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.delete_security_group(GroupName='coturn')
|
||||
response = ec2Client.delete_security_group(GroupName='tug-of-war')
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Delete old elastic ips...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.describe_addresses(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
||||
addresses = response['Addresses']
|
||||
for address in addresses:
|
||||
ec2Client.release_address(AllocationId=address['AllocationId'])
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
Loading…
x
Reference in New Issue
Block a user