added example-projects
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 299 KiB |
@ -0,0 +1,546 @@
|
||||
{
|
||||
"AWSTemplateFormatVersion": "2010-09-09",
|
||||
"Parameters": {
|
||||
"paramImageID": {
|
||||
"Type": "AWS::EC2::Image::Id",
|
||||
"Default": "ami-f573e19a",
|
||||
"Description": "Amazon Image ID (Amazon Linux), Frankfurt ami-f573e19a, N. Virginia ami-4dd18837"
|
||||
},
|
||||
"paramInstanceType": {
|
||||
"Type": "String",
|
||||
"Default": "t2.nano",
|
||||
"AllowedValues": [
|
||||
"t2.nano",
|
||||
"t2.micro",
|
||||
"m1.small"
|
||||
],
|
||||
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro."
|
||||
},
|
||||
"paramKeyPair": {
|
||||
"Type": "AWS::EC2::KeyPair::KeyName",
|
||||
"Description": "Amazon EC2 Key Pair"
|
||||
},
|
||||
"paramIamInstanceRole": {
|
||||
"Type": "String",
|
||||
"Default": "ec2-s3-vertsys-access-role",
|
||||
"Description": "IAM Instance Role"
|
||||
}
|
||||
},
|
||||
"Resources": {
|
||||
"lcVertSysAutoScaleConfigv11": {
|
||||
"Type": "AWS::AutoScaling::LaunchConfiguration",
|
||||
"Properties": {
|
||||
"AssociatePublicIpAddress": true,
|
||||
"ImageId": {
|
||||
"Ref": "paramImageID"
|
||||
},
|
||||
"InstanceType": {
|
||||
"Ref": "paramInstanceType"
|
||||
},
|
||||
"KeyName": {
|
||||
"Ref": "paramKeyPair"
|
||||
},
|
||||
"IamInstanceProfile": {
|
||||
"Ref": "paramIamInstanceRole"
|
||||
},
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"UserData": {
|
||||
"Fn::Base64": {
|
||||
"Fn::Join": [
|
||||
"",
|
||||
[
|
||||
"#!/bin/bash\n",
|
||||
"\n",
|
||||
"# this script will be run during the boot process by each VertSys instance created\n",
|
||||
"# in AWS currently this is a plain bash script that requires a RedHat based image\n",
|
||||
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n",
|
||||
"# distros\n",
|
||||
"#\n",
|
||||
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n",
|
||||
"\n",
|
||||
"# Config\n",
|
||||
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n",
|
||||
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n",
|
||||
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n",
|
||||
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n",
|
||||
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n",
|
||||
"\n",
|
||||
"# Create path to run the script\n",
|
||||
"mkdir $SCRIPT_ROOT_PATH\n",
|
||||
"cd $SCRIPT_ROOT_PATH\n",
|
||||
"\n",
|
||||
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n",
|
||||
"wget http://169.254.169.254/latest/user-data\n",
|
||||
"chmod +x user-data\n",
|
||||
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n",
|
||||
"\n",
|
||||
"# setting console prompt to include location (availability zone and region in AWS)\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n",
|
||||
"\n",
|
||||
"# wait for internet connection, should not be necessary, but just in case ;)\n",
|
||||
"while ! ping -c 1 -W 1 8.8.8.8; do\n",
|
||||
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n",
|
||||
" sleep 1\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# installation of required packages\n",
|
||||
"echo \"Installing packages...\"\n",
|
||||
"sudo yum update -y\n",
|
||||
"sudo yum install -y java git\n",
|
||||
"#rm -rf verteilte-systeme-bsc-ai-examples\n",
|
||||
"if [ ! -d $VERTSYS_PATH ]; then\n",
|
||||
" echo \"Cloning repo...\"\n",
|
||||
" git clone $REPO\n",
|
||||
"fi\n",
|
||||
"\n",
|
||||
"# killall running screens, .e.g to cleanup if script is run again after boot\n",
|
||||
"killall screen\n",
|
||||
"# start all jars\n",
|
||||
"echo \"Starting JARS: ${JARS}...\"\n",
|
||||
"for JAR in $JARS; do\n",
|
||||
" echo \"Starting ${JAR}...\"\n",
|
||||
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# wait a second, to allow java services to start\n",
|
||||
"sleep 1\n",
|
||||
"\n",
|
||||
"# output status of ports 36000-36199 and all running processes\n",
|
||||
"echo \"Status:\"\n",
|
||||
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n",
|
||||
"sudo ps aux | grep java\n",
|
||||
"\n",
|
||||
"# Example for path and contents:\n",
|
||||
"#\n",
|
||||
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n",
|
||||
"#\n",
|
||||
"#build-server-jars.xml TCPServerMulti.jar\n",
|
||||
"#RMIEchoServer.jar UDPServer.jar\n",
|
||||
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n",
|
||||
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n",
|
||||
"#TCPServer.jar\n"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"vpcCloudCompCounterDemo": {
|
||||
"Type": "AWS::EC2::VPC",
|
||||
"Properties": {
|
||||
"CidrBlock": "10.0.0.0/16",
|
||||
"EnableDnsSupport": "true",
|
||||
"EnableDnsHostnames": "true",
|
||||
"Tags": [
|
||||
{
|
||||
"Key": "Name",
|
||||
"Value": "vpcCloudCompCounterDemo"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"subnetCloudCompCounterDemoPublicSubnetAz1": {
|
||||
"Type": "AWS::EC2::Subnet",
|
||||
"Properties": {
|
||||
"VpcId": {
|
||||
"Ref": "vpcCloudCompCounterDemo"
|
||||
},
|
||||
"CidrBlock": "10.0.0.0/24",
|
||||
"AvailabilityZone": {
|
||||
"Fn::Select": [
|
||||
"0",
|
||||
{
|
||||
"Fn::GetAZs": {
|
||||
"Ref": "AWS::Region"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"Tags": [
|
||||
{
|
||||
"Key": "Name",
|
||||
"Value": "subnetCloudCompCounterDemoPublicSubnetAz1"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"subnetCloudCompCounterDemoPublicSubnetAz2": {
|
||||
"Type": "AWS::EC2::Subnet",
|
||||
"Properties": {
|
||||
"VpcId": {
|
||||
"Ref": "vpcCloudCompCounterDemo"
|
||||
},
|
||||
"CidrBlock": "10.0.1.0/24",
|
||||
"AvailabilityZone": {
|
||||
"Fn::Select": [
|
||||
"1",
|
||||
{
|
||||
"Fn::GetAZs": {
|
||||
"Ref": "AWS::Region"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"Tags": [
|
||||
{
|
||||
"Key": "Name",
|
||||
"Value": "subnetCloudCompCounterDemoPublicSubnetAz2"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"igCloudCompCounterDemo": {
|
||||
"Type": "AWS::EC2::InternetGateway",
|
||||
"Properties": {
|
||||
"Tags": [
|
||||
{
|
||||
"Key": "Name",
|
||||
"Value": "igCloudCompCounterDemo"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"attachGateway": {
|
||||
"Type": "AWS::EC2::VPCGatewayAttachment",
|
||||
"Properties": {
|
||||
"VpcId": {
|
||||
"Ref": "vpcCloudCompCounterDemo"
|
||||
},
|
||||
"InternetGatewayId": {
|
||||
"Ref": "igCloudCompCounterDemo"
|
||||
}
|
||||
}
|
||||
},
|
||||
"routetableViaIgw": {
|
||||
"Type": "AWS::EC2::RouteTable",
|
||||
"Properties": {
|
||||
"VpcId": {
|
||||
"Ref": "vpcCloudCompCounterDemo"
|
||||
},
|
||||
"Tags": [
|
||||
{
|
||||
"Key": "Name",
|
||||
"Value": "routetableViaIgw"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"publicrouteViaIgw": {
|
||||
"Type": "AWS::EC2::Route",
|
||||
"DependsOn": "attachGateway",
|
||||
"Properties": {
|
||||
"RouteTableId": {
|
||||
"Ref": "routetableViaIgw"
|
||||
},
|
||||
"DestinationCidrBlock": "0.0.0.0/0",
|
||||
"GatewayId": {
|
||||
"Ref": "igCloudCompCounterDemo"
|
||||
}
|
||||
}
|
||||
},
|
||||
"publicsubnet1RouteTableAssociation": {
|
||||
"Type": "AWS::EC2::SubnetRouteTableAssociation",
|
||||
"Properties": {
|
||||
"SubnetId": {
|
||||
"Ref": "subnetCloudCompCounterDemoPublicSubnetAz1"
|
||||
},
|
||||
"RouteTableId": {
|
||||
"Ref": "routetableViaIgw"
|
||||
}
|
||||
}
|
||||
},
|
||||
"publicsubnet2RouteTableAssociation": {
|
||||
"Type": "AWS::EC2::SubnetRouteTableAssociation",
|
||||
"Properties": {
|
||||
"SubnetId": {
|
||||
"Ref": "subnetCloudCompCounterDemoPublicSubnetAz2"
|
||||
},
|
||||
"RouteTableId": {
|
||||
"Ref": "routetableViaIgw"
|
||||
}
|
||||
}
|
||||
},
|
||||
"sgCloudCompDemoSecurityGroup": {
|
||||
"Type": "AWS::EC2::SecurityGroup",
|
||||
"Properties": {
|
||||
"GroupDescription": "CloudComp Counter Demo",
|
||||
"VpcId": {
|
||||
"Ref": "vpcCloudCompCounterDemo"
|
||||
}
|
||||
}
|
||||
},
|
||||
"ingress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress2": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "22",
|
||||
"ToPort": "22",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress3": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "udp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"egress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupEgress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "-1",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"asgCloudCompAutoScaleGroup": {
|
||||
"Type": "AWS::AutoScaling::AutoScalingGroup",
|
||||
"Properties": {
|
||||
"AvailabilityZones": [
|
||||
{
|
||||
"Fn::Select": [
|
||||
"0",
|
||||
{
|
||||
"Fn::GetAZs": {
|
||||
"Ref": "AWS::Region"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"Fn::Select": [
|
||||
"1",
|
||||
{
|
||||
"Fn::GetAZs": {
|
||||
"Ref": "AWS::Region"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"TargetGroupARNs": [
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
],
|
||||
"Cooldown": "30",
|
||||
"DesiredCapacity": "1",
|
||||
"HealthCheckGracePeriod": "60",
|
||||
"HealthCheckType": "EC2",
|
||||
"MaxSize": "3",
|
||||
"MinSize": "1",
|
||||
"VPCZoneIdentifier": [
|
||||
{
|
||||
"Ref": "subnetCloudCompCounterDemoPublicSubnetAz1"
|
||||
},
|
||||
{
|
||||
"Ref": "subnetCloudCompCounterDemoPublicSubnetAz2"
|
||||
}
|
||||
],
|
||||
"LaunchConfigurationName": {
|
||||
"Ref": "lcVertSysAutoScaleConfigv11"
|
||||
},
|
||||
"MetricsCollection": [
|
||||
{
|
||||
"Granularity": "1Minute",
|
||||
"Metrics": [
|
||||
"GroupPendingInstances",
|
||||
"GroupMinSize",
|
||||
"GroupDesiredCapacity",
|
||||
"GroupTerminatingInstances",
|
||||
"GroupInServiceInstances",
|
||||
"GroupStandbyInstances",
|
||||
"GroupMaxSize",
|
||||
"GroupTotalInstances"
|
||||
]
|
||||
}
|
||||
],
|
||||
"TerminationPolicies": [
|
||||
"Default"
|
||||
]
|
||||
}
|
||||
},
|
||||
"sgCloudCompScalePolicy": {
|
||||
"Type": "AWS::AutoScaling::ScalingPolicy",
|
||||
"DependsOn": "elbCloudCompListener",
|
||||
"Properties": {
|
||||
"PolicyType": "TargetTrackingScaling",
|
||||
"EstimatedInstanceWarmup": 60,
|
||||
"TargetTrackingConfiguration": {
|
||||
"DisableScaleIn": false,
|
||||
"TargetValue": 5,
|
||||
"PredefinedMetricSpecification": {
|
||||
"PredefinedMetricType": "ALBRequestCountPerTarget",
|
||||
"ResourceLabel": {
|
||||
"Fn::Join": [
|
||||
"/",
|
||||
[
|
||||
"app/elbCloudCompLoadBalancer",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"3",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"targetgroup/elbCloudCompTargetGroup",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"2",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"AutoScalingGroupName": {
|
||||
"Ref": "asgCloudCompAutoScaleGroup"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompLoadBalancer": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer",
|
||||
"Properties": {
|
||||
"Name": "elbCloudCompLoadBalancer",
|
||||
"IpAddressType": "ipv4",
|
||||
"Type": "application",
|
||||
"Scheme": "internet-facing",
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"Subnets": [
|
||||
{
|
||||
"Ref": "subnetCloudCompCounterDemoPublicSubnetAz1"
|
||||
},
|
||||
{
|
||||
"Ref": "subnetCloudCompCounterDemoPublicSubnetAz2"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"elbCloudCompTargetGroup": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup",
|
||||
"Properties": {
|
||||
"Port": 36042,
|
||||
"HealthCheckIntervalSeconds": 30,
|
||||
"HealthCheckTimeoutSeconds": 5,
|
||||
"HealthyThresholdCount": 2,
|
||||
"UnhealthyThresholdCount": 2,
|
||||
"HealthCheckPath": "/counter",
|
||||
"HealthCheckProtocol": "HTTP",
|
||||
"TargetGroupAttributes": [
|
||||
{
|
||||
"Key": "deregistration_delay.timeout_seconds",
|
||||
"Value": "20"
|
||||
}
|
||||
],
|
||||
"Protocol": "HTTP",
|
||||
"TargetType": "instance",
|
||||
"Matcher": {
|
||||
"HttpCode": "200"
|
||||
},
|
||||
"Name": "elbCloudCompTargetGroup",
|
||||
"VpcId": {
|
||||
"Ref": "vpcCloudCompCounterDemo"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompListener": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::Listener",
|
||||
"Properties": {
|
||||
"LoadBalancerArn": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
},
|
||||
"Protocol": "HTTP",
|
||||
"Port": 36042,
|
||||
"DefaultActions": [
|
||||
{
|
||||
"Type": "forward",
|
||||
"TargetGroupArn": {
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Outputs": {
|
||||
"LoadBalancer": {
|
||||
"Description": "Load Balancer",
|
||||
"Value": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
},
|
||||
"LoadBalancerDns": {
|
||||
"Description": "Load Balancer DNS",
|
||||
"Value": {
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
}
|
||||
},
|
||||
"LoadBalancerURL": {
|
||||
"Description": "Load Balancer URL",
|
||||
"Value": {
|
||||
"Fn::Join": [
|
||||
":",
|
||||
[
|
||||
{
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
},
|
||||
"36042/counter"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Description": "CloudComp Counter Demo"
|
||||
}
|
@ -0,0 +1,394 @@
|
||||
{
|
||||
"AWSTemplateFormatVersion": "2010-09-09",
|
||||
"Parameters": {
|
||||
"paramImageID": {
|
||||
"Type": "AWS::EC2::Image::Id",
|
||||
"Default": "ami-f573e19a",
|
||||
"Description": "Amazon Image ID"
|
||||
},
|
||||
"paramInstanceType": {
|
||||
"Type": "String",
|
||||
"Default": "t2.nano",
|
||||
"AllowedValues": [
|
||||
"t2.nano",
|
||||
"t2.micro",
|
||||
"m1.small"
|
||||
],
|
||||
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro."
|
||||
},
|
||||
"paramKeyPair": {
|
||||
"Type": "AWS::EC2::KeyPair::KeyName",
|
||||
"Description": "Amazon EC2 Key Pair"
|
||||
},
|
||||
"paramIamInstanceRole": {
|
||||
"Type": "String",
|
||||
"Default": "ec2-s3-vertsys-access-role",
|
||||
"Description": "IAM Instance Role"
|
||||
},
|
||||
"paramVPC": {
|
||||
"Type": "AWS::EC2::VPC::Id",
|
||||
"Description": "VPC"
|
||||
},
|
||||
"paramSubnetIDs": {
|
||||
"Type": "List<AWS::EC2::Subnet::Id>",
|
||||
"Description": "Subnet IDs"
|
||||
},
|
||||
"paramAvailabilityZones": {
|
||||
"Type": "List<AWS::EC2::AvailabilityZone::Name>",
|
||||
"Description": "AvailabilityZones"
|
||||
}
|
||||
},
|
||||
"Resources": {
|
||||
"lcVertSysAutoScaleConfigv11": {
|
||||
"Type": "AWS::AutoScaling::LaunchConfiguration",
|
||||
"Properties": {
|
||||
"AssociatePublicIpAddress": true,
|
||||
"ImageId": {
|
||||
"Ref": "paramImageID"
|
||||
},
|
||||
"InstanceType": {
|
||||
"Ref": "paramInstanceType"
|
||||
},
|
||||
"KeyName": {
|
||||
"Ref": "paramKeyPair"
|
||||
},
|
||||
"IamInstanceProfile": {
|
||||
"Ref": "paramIamInstanceRole"
|
||||
},
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"UserData": {
|
||||
"Fn::Base64": {
|
||||
"Fn::Join": [
|
||||
"",
|
||||
[
|
||||
"#!/bin/bash\n",
|
||||
"\n",
|
||||
"# this script will be run during the boot process by each VertSys instance created\n",
|
||||
"# in AWS currently this is a plain bash script that requires a RedHat based image\n",
|
||||
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n",
|
||||
"# distros\n",
|
||||
"#\n",
|
||||
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n",
|
||||
"\n",
|
||||
"# Config\n",
|
||||
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n",
|
||||
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n",
|
||||
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n",
|
||||
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n",
|
||||
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n",
|
||||
"\n",
|
||||
"# Create path to run the script\n",
|
||||
"mkdir $SCRIPT_ROOT_PATH\n",
|
||||
"cd $SCRIPT_ROOT_PATH\n",
|
||||
"\n",
|
||||
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n",
|
||||
"wget http://169.254.169.254/latest/user-data\n",
|
||||
"chmod +x user-data\n",
|
||||
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n",
|
||||
"\n",
|
||||
"# setting console prompt to include location (availability zone and region in AWS)\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n",
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n",
|
||||
"\n",
|
||||
"# wait for internet connection, should not be necessary, but just in case ;)\n",
|
||||
"while ! ping -c 1 -W 1 8.8.8.8; do\n",
|
||||
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n",
|
||||
" sleep 1\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# installation of required packages\n",
|
||||
"echo \"Installing packages...\"\n",
|
||||
"sudo yum update -y\n",
|
||||
"sudo yum install -y java git\n",
|
||||
"#rm -rf verteilte-systeme-bsc-ai-examples\n",
|
||||
"if [ ! -d $VERTSYS_PATH ]; then\n",
|
||||
" echo \"Cloning repo...\"\n",
|
||||
" git clone $REPO\n",
|
||||
"fi\n",
|
||||
"\n",
|
||||
"# killall running screens, .e.g to cleanup if script is run again after boot\n",
|
||||
"killall screen\n",
|
||||
"# start all jars\n",
|
||||
"echo \"Starting JARS: ${JARS}...\"\n",
|
||||
"for JAR in $JARS; do\n",
|
||||
" echo \"Starting ${JAR}...\"\n",
|
||||
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n",
|
||||
"done\n",
|
||||
"\n",
|
||||
"# wait a second, to allow java services to start\n",
|
||||
"sleep 1\n",
|
||||
"\n",
|
||||
"# output status of ports 36000-36199 and all running processes\n",
|
||||
"echo \"Status:\"\n",
|
||||
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n",
|
||||
"sudo ps aux | grep java\n",
|
||||
"\n",
|
||||
"# Example for path and contents:\n",
|
||||
"#\n",
|
||||
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n",
|
||||
"#\n",
|
||||
"#build-server-jars.xml TCPServerMulti.jar\n",
|
||||
"#RMIEchoServer.jar UDPServer.jar\n",
|
||||
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n",
|
||||
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n",
|
||||
"#TCPServer.jar\n"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"sgCloudCompDemoSecurityGroup": {
|
||||
"Type": "AWS::EC2::SecurityGroup",
|
||||
"Properties": {
|
||||
"GroupDescription": "CloudComp Counter Demo",
|
||||
"VpcId": {
|
||||
"Ref": "paramVPC"
|
||||
}
|
||||
}
|
||||
},
|
||||
"ingress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress2": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "tcp",
|
||||
"FromPort": "22",
|
||||
"ToPort": "22",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"ingress3": {
|
||||
"Type": "AWS::EC2::SecurityGroupIngress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "udp",
|
||||
"FromPort": "36037",
|
||||
"ToPort": "36137",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"egress1": {
|
||||
"Type": "AWS::EC2::SecurityGroupEgress",
|
||||
"Properties": {
|
||||
"GroupId": {
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
},
|
||||
"IpProtocol": "-1",
|
||||
"CidrIp": "0.0.0.0/0"
|
||||
}
|
||||
},
|
||||
"asgCloudCompAutoScaleGroup": {
|
||||
"Type": "AWS::AutoScaling::AutoScalingGroup",
|
||||
"Properties": {
|
||||
"AvailabilityZones": {
|
||||
"Ref": "paramAvailabilityZones"
|
||||
},
|
||||
"TargetGroupARNs": [
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
],
|
||||
"Cooldown": "30",
|
||||
"DesiredCapacity": "1",
|
||||
"HealthCheckGracePeriod": "60",
|
||||
"HealthCheckType": "EC2",
|
||||
"MaxSize": "3",
|
||||
"MinSize": "1",
|
||||
"VPCZoneIdentifier": {
|
||||
"Ref": "paramSubnetIDs"
|
||||
},
|
||||
"LaunchConfigurationName": {
|
||||
"Ref": "lcVertSysAutoScaleConfigv11"
|
||||
},
|
||||
"MetricsCollection": [
|
||||
{
|
||||
"Granularity": "1Minute",
|
||||
"Metrics": [
|
||||
"GroupPendingInstances",
|
||||
"GroupMinSize",
|
||||
"GroupDesiredCapacity",
|
||||
"GroupTerminatingInstances",
|
||||
"GroupInServiceInstances",
|
||||
"GroupStandbyInstances",
|
||||
"GroupMaxSize",
|
||||
"GroupTotalInstances"
|
||||
]
|
||||
}
|
||||
],
|
||||
"TerminationPolicies": [
|
||||
"Default"
|
||||
]
|
||||
}
|
||||
},
|
||||
"sgCloudCompScalePolicy": {
|
||||
"Type": "AWS::AutoScaling::ScalingPolicy",
|
||||
"DependsOn": "elbCloudCompListener",
|
||||
"Properties": {
|
||||
"PolicyType": "TargetTrackingScaling",
|
||||
"EstimatedInstanceWarmup": 60,
|
||||
"TargetTrackingConfiguration": {
|
||||
"DisableScaleIn": false,
|
||||
"TargetValue": 5,
|
||||
"PredefinedMetricSpecification": {
|
||||
"PredefinedMetricType": "ALBRequestCountPerTarget",
|
||||
"ResourceLabel": {
|
||||
"Fn::Join": [
|
||||
"/",
|
||||
[
|
||||
"app/elbCloudCompLoadBalancer",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"3",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"targetgroup/elbCloudCompTargetGroup",
|
||||
{
|
||||
"Fn::Select": [
|
||||
"2",
|
||||
{
|
||||
"Fn::Split": [
|
||||
"/",
|
||||
{
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"AutoScalingGroupName": {
|
||||
"Ref": "asgCloudCompAutoScaleGroup"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompLoadBalancer": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer",
|
||||
"Properties": {
|
||||
"Name": "elbCloudCompLoadBalancer",
|
||||
"IpAddressType": "ipv4",
|
||||
"Type": "application",
|
||||
"Scheme": "internet-facing",
|
||||
"SecurityGroups": [
|
||||
{
|
||||
"Ref": "sgCloudCompDemoSecurityGroup"
|
||||
}
|
||||
],
|
||||
"Subnets": {
|
||||
"Ref": "paramSubnetIDs"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompTargetGroup": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup",
|
||||
"Properties": {
|
||||
"Port": 36042,
|
||||
"HealthCheckIntervalSeconds": 30,
|
||||
"HealthCheckTimeoutSeconds": 5,
|
||||
"HealthyThresholdCount": 2,
|
||||
"UnhealthyThresholdCount": 2,
|
||||
"HealthCheckPath": "/counter",
|
||||
"HealthCheckProtocol": "HTTP",
|
||||
"TargetGroupAttributes": [
|
||||
{
|
||||
"Key": "deregistration_delay.timeout_seconds",
|
||||
"Value": "20"
|
||||
}
|
||||
],
|
||||
"Protocol": "HTTP",
|
||||
"TargetType": "instance",
|
||||
"Matcher": {
|
||||
"HttpCode": "200"
|
||||
},
|
||||
"Name": "elbCloudCompTargetGroup",
|
||||
"VpcId": {
|
||||
"Ref": "paramVPC"
|
||||
}
|
||||
}
|
||||
},
|
||||
"elbCloudCompListener": {
|
||||
"Type": "AWS::ElasticLoadBalancingV2::Listener",
|
||||
"Properties": {
|
||||
"LoadBalancerArn": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
},
|
||||
"Protocol": "HTTP",
|
||||
"Port": 36042,
|
||||
"DefaultActions": [
|
||||
{
|
||||
"Type": "forward",
|
||||
"TargetGroupArn": {
|
||||
"Ref": "elbCloudCompTargetGroup"
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Outputs": {
|
||||
"LoadBalancer": {
|
||||
"Description": "Load Balancer",
|
||||
"Value": {
|
||||
"Ref": "elbCloudCompLoadBalancer"
|
||||
}
|
||||
},
|
||||
"LoadBalancerDns": {
|
||||
"Description": "Load Balancer DNS",
|
||||
"Value": {
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
}
|
||||
},
|
||||
"LoadBalancerURL": {
|
||||
"Description": "Load Balancer URL",
|
||||
"Value": {
|
||||
"Fn::Join": [
|
||||
":",
|
||||
[
|
||||
{
|
||||
"Fn::GetAtt": [
|
||||
"elbCloudCompLoadBalancer",
|
||||
"DNSName"
|
||||
]
|
||||
},
|
||||
"36042/counter"
|
||||
]
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
"Description": "CloudComp Counter Demo"
|
||||
}
|
184
example-projects/tug-of-war-in-the-clouds/start.py
Normal file
184
example-projects/tug-of-war-in-the-clouds/start.py
Normal file
@ -0,0 +1,184 @@
|
||||
import boto3
|
||||
from botocore.exceptions import ClientError
|
||||
|
||||
region = 'eu-central-1'
|
||||
availabilityZone = 'eu-central-1b'
|
||||
imageId = 'ami-0cc293023f983ed53'
|
||||
instanceType = 't3.nano'
|
||||
keyName = 'srieger-pub'
|
||||
userDataDB = ('#!/bin/bash\n'
|
||||
'#!/bin/bash\n'
|
||||
'# extra repo for RedHat rpms\n'
|
||||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
||||
'# essential tools\n'
|
||||
'yum install -y joe htop git\n'
|
||||
'# mysql\n'
|
||||
'yum install -y mariadb mariadb-server\n'
|
||||
'\n'
|
||||
'service mariadb start\n'
|
||||
'\n'
|
||||
'echo "create database cloud_tug_of_war" | mysql -u root\n'
|
||||
'\n'
|
||||
'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n'
|
||||
'\n'
|
||||
'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloud\';" | mysql -u root\n'
|
||||
'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n'
|
||||
'echo "FLUSH PRIVILEGES" | mysql -u root\n'
|
||||
)
|
||||
|
||||
# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/"
|
||||
|
||||
client = boto3.setup_default_session(region_name=region)
|
||||
ec2Client = boto3.client("ec2")
|
||||
ec2Resource = boto3.resource('ec2')
|
||||
|
||||
response = ec2Client.describe_vpcs()
|
||||
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
||||
subnet_id = ec2Client.describe_subnets(
|
||||
Filters=[
|
||||
{
|
||||
'Name': 'availability-zone', 'Values': [availabilityZone]
|
||||
}
|
||||
])['Subnets'][0]['SubnetId']
|
||||
|
||||
print("Deleting old instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}])
|
||||
print(response)
|
||||
reservations = response['Reservations']
|
||||
for reservation in reservations:
|
||||
for instance in reservation['Instances']:
|
||||
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending":
|
||||
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
|
||||
print(response)
|
||||
instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
|
||||
instanceToTerminate.wait_until_terminated()
|
||||
|
||||
print("Delete old security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.delete_security_group(GroupName='tug-of-war')
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Create security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.create_security_group(GroupName='tug-of-war',
|
||||
Description='tug-of-war',
|
||||
VpcId=vpc_id)
|
||||
security_group_id = response['GroupId']
|
||||
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
|
||||
|
||||
data = ec2Client.authorize_security_group_ingress(
|
||||
GroupId=security_group_id,
|
||||
IpPermissions=[
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 3306,
|
||||
'ToPort': 3306,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 22,
|
||||
'ToPort': 22,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 80,
|
||||
'ToPort': 80,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||
{'IpProtocol': 'tcp',
|
||||
'FromPort': 443,
|
||||
'ToPort': 443,
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}
|
||||
])
|
||||
print('Ingress Successfully Set %s' % data)
|
||||
except ClientError as e:
|
||||
print(e)
|
||||
|
||||
print("Running new DB instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.run_instances(
|
||||
ImageId=imageId,
|
||||
InstanceType=instanceType,
|
||||
Placement={'AvailabilityZone': availabilityZone, },
|
||||
KeyName=keyName,
|
||||
MinCount=1,
|
||||
MaxCount=1,
|
||||
UserData=userDataDB,
|
||||
SecurityGroupIds=[
|
||||
security_group_id,
|
||||
],
|
||||
TagSpecifications=[
|
||||
{
|
||||
'ResourceType': 'instance',
|
||||
'Tags': [
|
||||
{'Key': 'Name', 'Value': 'tug-of-war-db1'},
|
||||
{'Key': 'tug-of-war', 'Value': 'installed'}
|
||||
],
|
||||
}
|
||||
],
|
||||
)
|
||||
|
||||
instanceIdDB = response['Instances'][0]['InstanceId']
|
||||
privateIpDB = response['Instances'][0]['PrivateIpAddress']
|
||||
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
||||
|
||||
instance = ec2Resource.Instance(instanceIdDB)
|
||||
instance.wait_until_running()
|
||||
|
||||
print(instanceIdDB)
|
||||
|
||||
userDataWebServer = ('#!/bin/bash\n'
|
||||
'# extra repo for RedHat rpms\n'
|
||||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
||||
'# essential tools\n'
|
||||
'yum install -y joe htop git\n'
|
||||
'# mysql\n'
|
||||
'yum install -y httpd php php-mysql\n'
|
||||
'\n'
|
||||
'service httpd start\n'
|
||||
'\n'
|
||||
'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n'
|
||||
'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n'
|
||||
'cd /var/www/html\n'
|
||||
'tar zxvf tug-of-war-in-the-clouds.tar.gz\n'
|
||||
'\n'
|
||||
'# change hostname of db connection\n'
|
||||
'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n'
|
||||
)
|
||||
|
||||
print("Running new Web Server instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.run_instances(
|
||||
ImageId=imageId,
|
||||
InstanceType=instanceType,
|
||||
Placement={'AvailabilityZone': availabilityZone, },
|
||||
KeyName=keyName,
|
||||
MinCount=1,
|
||||
MaxCount=1,
|
||||
UserData=userDataWebServer,
|
||||
SecurityGroupIds=[
|
||||
security_group_id,
|
||||
],
|
||||
|
||||
TagSpecifications=[
|
||||
{
|
||||
'ResourceType': 'instance',
|
||||
'Tags': [
|
||||
{'Key': 'Name', 'Value': 'tug-of-war-webserver1'},
|
||||
{'Key': 'tug-of-war', 'Value': 'installed'}
|
||||
],
|
||||
}
|
||||
],
|
||||
)
|
||||
|
||||
instanceIdDB = response['Instances'][0]['InstanceId']
|
||||
privateIpDB = response['Instances'][0]['PrivateIpAddress']
|
||||
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
||||
|
||||
instance = ec2Resource.Instance(instanceIdDB)
|
||||
instance.wait_until_running()
|
33
example-projects/tug-of-war-in-the-clouds/stop.py
Normal file
33
example-projects/tug-of-war-in-the-clouds/stop.py
Normal file
@ -0,0 +1,33 @@
|
||||
import boto3
|
||||
from botocore.exceptions import ClientError
|
||||
|
||||
region = 'eu-central-1'
|
||||
|
||||
client = boto3.setup_default_session(region_name=region)
|
||||
ec2Client = boto3.client("ec2")
|
||||
ec2Resource = boto3.resource('ec2')
|
||||
|
||||
response = ec2Client.describe_vpcs()
|
||||
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
||||
|
||||
print("Deleting old instance...")
|
||||
print("------------------------------------")
|
||||
|
||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}])
|
||||
print(response)
|
||||
reservations = response['Reservations']
|
||||
for reservation in reservations:
|
||||
for instance in reservation['Instances']:
|
||||
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending":
|
||||
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
|
||||
print(response)
|
||||
instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
|
||||
instanceToTerminate.wait_until_terminated()
|
||||
|
||||
print("Delete old security group...")
|
||||
print("------------------------------------")
|
||||
|
||||
try:
|
||||
response = ec2Client.delete_security_group(GroupName='tug-of-war')
|
||||
except ClientError as e:
|
||||
print(e)
|
Reference in New Issue
Block a user