added example-projects
This commit is contained in:
parent
ba80260324
commit
4c2da97e78
@ -1,241 +0,0 @@
|
|||||||
import boto3
|
|
||||||
from botocore.exceptions import ClientError
|
|
||||||
|
|
||||||
region = 'eu-central-1'
|
|
||||||
availabilityZone = 'eu-central-1b'
|
|
||||||
imageId = 'ami-0cc293023f983ed53'
|
|
||||||
instanceType = 't3.nano'
|
|
||||||
keyName = 'srieger-pub'
|
|
||||||
userData = ('#!/bin/bash\n'
|
|
||||||
'COTURN_VERSION="4.5.1.1"\n'
|
|
||||||
'LIBEVENT_VERSION="2.0.21"\n'
|
|
||||||
'\n'
|
|
||||||
'# extra repo for RedHat rpms\n'
|
|
||||||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
|
||||||
'# essential tools\n'
|
|
||||||
'yum install -y joe htop git\n'
|
|
||||||
'# coturn requirements\n'
|
|
||||||
'yum install -y gcc openssl-devel\n'
|
|
||||||
'yum install -y sqlite-devel mysql-devel hiredis-devel mongo-c-driver-devel\n'
|
|
||||||
'\n'
|
|
||||||
'### libevent installation ###\n'
|
|
||||||
'wget https://github.com/downloads/libevent/libevent/libevent-$LIBEVENT_VERSION-stable.tar.gz\n'
|
|
||||||
'\n'
|
|
||||||
'tar xvfz libevent-$LIBEVENT_VERSION-stable.tar.gz\n'
|
|
||||||
'cd libevent-$LIBEVENT_VERSION-stable\n'
|
|
||||||
'./configure\n'
|
|
||||||
'make\n'
|
|
||||||
'make install\n'
|
|
||||||
'\n'
|
|
||||||
'### turnserver installation ###\n'
|
|
||||||
'wget https://coturn.net/turnserver/v$COTURN_VERSION/turnserver-$COTURN_VERSION.tar.gz\n'
|
|
||||||
'tar xvfz turnserver-$COTURN_VERSION.tar.gz\n'
|
|
||||||
'cd turnserver-$COTURN_VERSION\n'
|
|
||||||
'./configure\n'
|
|
||||||
'make\n'
|
|
||||||
'make install\n'
|
|
||||||
'\n'
|
|
||||||
'openssl req -new -subj "/CN=coturn" -newkey rsa:4096 -x509 -sha256 -days 365 -nodes -out /usr/local/etc/turn_server_cert.pem -keyout /usr/local/etc/turn_server_pkey.pem\n'
|
|
||||||
'\n'
|
|
||||||
'/usr/local/bin/turnadmin -a -u srieger -r hs-fulda.de -p coturnserver2019\n'
|
|
||||||
'/usr/local/bin/turnadmin -A -u srieger -p coturnserver2019\n'
|
|
||||||
'\n'
|
|
||||||
'MAC_ETH0=$(cat /sys/class/net/eth0/address)\n'
|
|
||||||
'MAC_ETH1=$(cat /sys/class/net/eth1/address)\n'
|
|
||||||
'LOCAL_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/local-ipv4s)\n'
|
|
||||||
'LOCAL_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/local-ipv4s)\n'
|
|
||||||
'PUBLIC_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/public-ipv4s)\n'
|
|
||||||
'PUBLIC_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/public-ipv4s)\n'
|
|
||||||
'\n'
|
|
||||||
'cat <<EOF > /usr/local/etc/turnserver.conf\n'
|
|
||||||
'verbose\n'
|
|
||||||
'listening-ip=$LOCAL_IPV4S_ETH0\n'
|
|
||||||
'listening-ip=$LOCAL_IPV4S_ETH1\n'
|
|
||||||
'relay-ip=$LOCAL_IPV4S_ETH0\n'
|
|
||||||
'relay-ip=$LOCAL_IPV4S_ETH1\n'
|
|
||||||
'external-ip=$PUBLIC_IPV4S_ETH0/$LOCAL_IPV4S_ETH0\n'
|
|
||||||
'external-ip=$PUBLIC_IPV4S_ETH1/$LOCAL_IPV4S_ETH1\n'
|
|
||||||
'fingerprint\n'
|
|
||||||
'lt-cred-mech\n'
|
|
||||||
'#use-auth-secret\n'
|
|
||||||
'#static-auth-secret=751c45cae60a2839711a94c8d6bf0089e78b2149ca602fdXXXXXXXXXXXXXXXXX\n'
|
|
||||||
'realm=hs-fulda.de\n'
|
|
||||||
'total-quota=100\n'
|
|
||||||
'stale-nonce\n'
|
|
||||||
'cipher-list="ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AES:RSA+3DES:!ADH:!AECDH:!MD5"\n'
|
|
||||||
'#no-stun\n'
|
|
||||||
'#no-loopback-peers\n'
|
|
||||||
'#no-multicast-peers\n'
|
|
||||||
'cli-password=coturnserver2019\n'
|
|
||||||
'web-admin\n'
|
|
||||||
'web-admin-ip=$LOCAL_IPV4S_ETH0\n'
|
|
||||||
'EOF\n'
|
|
||||||
'\n'
|
|
||||||
'/usr/local/bin/turnserver\n'
|
|
||||||
)
|
|
||||||
|
|
||||||
# convert with: cat install-coturn | sed "s/^/'/; s/$/\\\n'/"
|
|
||||||
|
|
||||||
client = boto3.setup_default_session(region_name=region)
|
|
||||||
ec2Client = boto3.client("ec2")
|
|
||||||
ec2Resource = boto3.resource('ec2')
|
|
||||||
|
|
||||||
response = ec2Client.describe_vpcs()
|
|
||||||
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
|
||||||
subnet_id = ec2Client.describe_subnets(
|
|
||||||
Filters=[
|
|
||||||
{
|
|
||||||
'Name': 'availability-zone', 'Values': [availabilityZone]
|
|
||||||
}
|
|
||||||
])['Subnets'][0]['SubnetId']
|
|
||||||
|
|
||||||
print("Deleting old instance...")
|
|
||||||
print("------------------------------------")
|
|
||||||
|
|
||||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
|
||||||
print(response)
|
|
||||||
reservations = response['Reservations']
|
|
||||||
for reservation in reservations:
|
|
||||||
for instance in reservation['Instances']:
|
|
||||||
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending":
|
|
||||||
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
|
|
||||||
print(response)
|
|
||||||
instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
|
|
||||||
instanceToTerminate.wait_until_terminated()
|
|
||||||
|
|
||||||
print("Delete old security group...")
|
|
||||||
print("------------------------------------")
|
|
||||||
|
|
||||||
try:
|
|
||||||
response = ec2Client.delete_security_group(GroupName='coturn')
|
|
||||||
except ClientError as e:
|
|
||||||
print(e)
|
|
||||||
|
|
||||||
print("Delete old elastic ips...")
|
|
||||||
print("------------------------------------")
|
|
||||||
|
|
||||||
try:
|
|
||||||
response = ec2Client.describe_addresses(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
|
||||||
addresses = response['Addresses']
|
|
||||||
for address in addresses:
|
|
||||||
ec2Client.release_address(AllocationId=address['AllocationId'])
|
|
||||||
except ClientError as e:
|
|
||||||
print(e)
|
|
||||||
|
|
||||||
print("Create security group...")
|
|
||||||
print("------------------------------------")
|
|
||||||
|
|
||||||
try:
|
|
||||||
response = ec2Client.create_security_group(GroupName='coturn',
|
|
||||||
Description='coturn',
|
|
||||||
VpcId=vpc_id)
|
|
||||||
security_group_id = response['GroupId']
|
|
||||||
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
|
|
||||||
|
|
||||||
data = ec2Client.authorize_security_group_ingress(
|
|
||||||
GroupId=security_group_id,
|
|
||||||
IpPermissions=[
|
|
||||||
{'IpProtocol': 'tcp',
|
|
||||||
'FromPort': 3478,
|
|
||||||
'ToPort': 3478,
|
|
||||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
||||||
{'IpProtocol': 'udp',
|
|
||||||
'FromPort': 3478,
|
|
||||||
'ToPort': 3478,
|
|
||||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
||||||
{'IpProtocol': 'tcp',
|
|
||||||
'FromPort': 5349,
|
|
||||||
'ToPort': 5349,
|
|
||||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
||||||
{'IpProtocol': 'udp',
|
|
||||||
'FromPort': 5349,
|
|
||||||
'ToPort': 5349,
|
|
||||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
||||||
{'IpProtocol': 'tcp',
|
|
||||||
'FromPort': 8080,
|
|
||||||
'ToPort': 8080,
|
|
||||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
||||||
{'IpProtocol': 'udp',
|
|
||||||
'FromPort': 49152,
|
|
||||||
'ToPort': 65535,
|
|
||||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
||||||
{'IpProtocol': 'tcp',
|
|
||||||
'FromPort': 22,
|
|
||||||
'ToPort': 22,
|
|
||||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}
|
|
||||||
])
|
|
||||||
print('Ingress Successfully Set %s' % data)
|
|
||||||
except ClientError as e:
|
|
||||||
print(e)
|
|
||||||
|
|
||||||
print("Allocate additional elastic ips...")
|
|
||||||
print("------------------------------------")
|
|
||||||
|
|
||||||
response = ec2Client.allocate_address(
|
|
||||||
Domain='vpc',
|
|
||||||
)
|
|
||||||
firstIpAddressAllocationId = response['AllocationId']
|
|
||||||
ec2Client.create_tags(Resources=[firstIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}])
|
|
||||||
|
|
||||||
response = ec2Client.allocate_address(
|
|
||||||
Domain='vpc',
|
|
||||||
)
|
|
||||||
secondIpAddressAllocationId = response['AllocationId']
|
|
||||||
ec2Client.create_tags(Resources=[secondIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}])
|
|
||||||
|
|
||||||
print("Running new instance...")
|
|
||||||
print("------------------------------------")
|
|
||||||
|
|
||||||
response = ec2Client.run_instances(
|
|
||||||
ImageId=imageId,
|
|
||||||
InstanceType=instanceType,
|
|
||||||
Placement={'AvailabilityZone': availabilityZone, },
|
|
||||||
KeyName=keyName,
|
|
||||||
MinCount=1,
|
|
||||||
MaxCount=1,
|
|
||||||
UserData=userData,
|
|
||||||
NetworkInterfaces=[
|
|
||||||
{
|
|
||||||
'DeviceIndex': 0,
|
|
||||||
'Groups': [
|
|
||||||
security_group_id,
|
|
||||||
],
|
|
||||||
'SubnetId': subnet_id,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
'DeviceIndex': 1,
|
|
||||||
'Groups': [
|
|
||||||
security_group_id,
|
|
||||||
],
|
|
||||||
'SubnetId': subnet_id,
|
|
||||||
},
|
|
||||||
],
|
|
||||||
TagSpecifications=[
|
|
||||||
{
|
|
||||||
'ResourceType': 'instance',
|
|
||||||
'Tags': [
|
|
||||||
{'Key': 'coturn', 'Value': 'installed'}
|
|
||||||
],
|
|
||||||
}
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
instanceId = response['Instances'][0]['InstanceId']
|
|
||||||
firstNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
|
||||||
secondNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][1]['NetworkInterfaceId']
|
|
||||||
|
|
||||||
instance = ec2Resource.Instance(instanceId)
|
|
||||||
instance.wait_until_running()
|
|
||||||
|
|
||||||
response = ec2Client.associate_address(
|
|
||||||
AllocationId=firstIpAddressAllocationId,
|
|
||||||
NetworkInterfaceId=firstNetworkInterfaceId,
|
|
||||||
)
|
|
||||||
response = ec2Client.associate_address(
|
|
||||||
AllocationId=secondIpAddressAllocationId,
|
|
||||||
NetworkInterfaceId=secondNetworkInterfaceId,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
print(instanceId)
|
|
||||||
|
|
Before Width: | Height: | Size: 299 KiB After Width: | Height: | Size: 299 KiB |
184
example-projects/tug-of-war-in-the-clouds/start.py
Normal file
184
example-projects/tug-of-war-in-the-clouds/start.py
Normal file
@ -0,0 +1,184 @@
|
|||||||
|
import boto3
|
||||||
|
from botocore.exceptions import ClientError
|
||||||
|
|
||||||
|
region = 'eu-central-1'
|
||||||
|
availabilityZone = 'eu-central-1b'
|
||||||
|
imageId = 'ami-0cc293023f983ed53'
|
||||||
|
instanceType = 't3.nano'
|
||||||
|
keyName = 'srieger-pub'
|
||||||
|
userDataDB = ('#!/bin/bash\n'
|
||||||
|
'#!/bin/bash\n'
|
||||||
|
'# extra repo for RedHat rpms\n'
|
||||||
|
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
||||||
|
'# essential tools\n'
|
||||||
|
'yum install -y joe htop git\n'
|
||||||
|
'# mysql\n'
|
||||||
|
'yum install -y mariadb mariadb-server\n'
|
||||||
|
'\n'
|
||||||
|
'service mariadb start\n'
|
||||||
|
'\n'
|
||||||
|
'echo "create database cloud_tug_of_war" | mysql -u root\n'
|
||||||
|
'\n'
|
||||||
|
'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n'
|
||||||
|
'\n'
|
||||||
|
'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloud\';" | mysql -u root\n'
|
||||||
|
'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n'
|
||||||
|
'echo "FLUSH PRIVILEGES" | mysql -u root\n'
|
||||||
|
)
|
||||||
|
|
||||||
|
# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/"
|
||||||
|
|
||||||
|
client = boto3.setup_default_session(region_name=region)
|
||||||
|
ec2Client = boto3.client("ec2")
|
||||||
|
ec2Resource = boto3.resource('ec2')
|
||||||
|
|
||||||
|
response = ec2Client.describe_vpcs()
|
||||||
|
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
||||||
|
subnet_id = ec2Client.describe_subnets(
|
||||||
|
Filters=[
|
||||||
|
{
|
||||||
|
'Name': 'availability-zone', 'Values': [availabilityZone]
|
||||||
|
}
|
||||||
|
])['Subnets'][0]['SubnetId']
|
||||||
|
|
||||||
|
print("Deleting old instance...")
|
||||||
|
print("------------------------------------")
|
||||||
|
|
||||||
|
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}])
|
||||||
|
print(response)
|
||||||
|
reservations = response['Reservations']
|
||||||
|
for reservation in reservations:
|
||||||
|
for instance in reservation['Instances']:
|
||||||
|
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending":
|
||||||
|
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
|
||||||
|
print(response)
|
||||||
|
instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
|
||||||
|
instanceToTerminate.wait_until_terminated()
|
||||||
|
|
||||||
|
print("Delete old security group...")
|
||||||
|
print("------------------------------------")
|
||||||
|
|
||||||
|
try:
|
||||||
|
response = ec2Client.delete_security_group(GroupName='tug-of-war')
|
||||||
|
except ClientError as e:
|
||||||
|
print(e)
|
||||||
|
|
||||||
|
print("Create security group...")
|
||||||
|
print("------------------------------------")
|
||||||
|
|
||||||
|
try:
|
||||||
|
response = ec2Client.create_security_group(GroupName='tug-of-war',
|
||||||
|
Description='tug-of-war',
|
||||||
|
VpcId=vpc_id)
|
||||||
|
security_group_id = response['GroupId']
|
||||||
|
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
|
||||||
|
|
||||||
|
data = ec2Client.authorize_security_group_ingress(
|
||||||
|
GroupId=security_group_id,
|
||||||
|
IpPermissions=[
|
||||||
|
{'IpProtocol': 'tcp',
|
||||||
|
'FromPort': 3306,
|
||||||
|
'ToPort': 3306,
|
||||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||||
|
{'IpProtocol': 'tcp',
|
||||||
|
'FromPort': 22,
|
||||||
|
'ToPort': 22,
|
||||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||||
|
{'IpProtocol': 'tcp',
|
||||||
|
'FromPort': 80,
|
||||||
|
'ToPort': 80,
|
||||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
||||||
|
{'IpProtocol': 'tcp',
|
||||||
|
'FromPort': 443,
|
||||||
|
'ToPort': 443,
|
||||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}
|
||||||
|
])
|
||||||
|
print('Ingress Successfully Set %s' % data)
|
||||||
|
except ClientError as e:
|
||||||
|
print(e)
|
||||||
|
|
||||||
|
print("Running new DB instance...")
|
||||||
|
print("------------------------------------")
|
||||||
|
|
||||||
|
response = ec2Client.run_instances(
|
||||||
|
ImageId=imageId,
|
||||||
|
InstanceType=instanceType,
|
||||||
|
Placement={'AvailabilityZone': availabilityZone, },
|
||||||
|
KeyName=keyName,
|
||||||
|
MinCount=1,
|
||||||
|
MaxCount=1,
|
||||||
|
UserData=userDataDB,
|
||||||
|
SecurityGroupIds=[
|
||||||
|
security_group_id,
|
||||||
|
],
|
||||||
|
TagSpecifications=[
|
||||||
|
{
|
||||||
|
'ResourceType': 'instance',
|
||||||
|
'Tags': [
|
||||||
|
{'Key': 'Name', 'Value': 'tug-of-war-db1'},
|
||||||
|
{'Key': 'tug-of-war', 'Value': 'installed'}
|
||||||
|
],
|
||||||
|
}
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
instanceIdDB = response['Instances'][0]['InstanceId']
|
||||||
|
privateIpDB = response['Instances'][0]['PrivateIpAddress']
|
||||||
|
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
||||||
|
|
||||||
|
instance = ec2Resource.Instance(instanceIdDB)
|
||||||
|
instance.wait_until_running()
|
||||||
|
|
||||||
|
print(instanceIdDB)
|
||||||
|
|
||||||
|
userDataWebServer = ('#!/bin/bash\n'
|
||||||
|
'# extra repo for RedHat rpms\n'
|
||||||
|
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
||||||
|
'# essential tools\n'
|
||||||
|
'yum install -y joe htop git\n'
|
||||||
|
'# mysql\n'
|
||||||
|
'yum install -y httpd php php-mysql\n'
|
||||||
|
'\n'
|
||||||
|
'service httpd start\n'
|
||||||
|
'\n'
|
||||||
|
'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n'
|
||||||
|
'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n'
|
||||||
|
'cd /var/www/html\n'
|
||||||
|
'tar zxvf tug-of-war-in-the-clouds.tar.gz\n'
|
||||||
|
'\n'
|
||||||
|
'# change hostname of db connection\n'
|
||||||
|
'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n'
|
||||||
|
)
|
||||||
|
|
||||||
|
print("Running new Web Server instance...")
|
||||||
|
print("------------------------------------")
|
||||||
|
|
||||||
|
response = ec2Client.run_instances(
|
||||||
|
ImageId=imageId,
|
||||||
|
InstanceType=instanceType,
|
||||||
|
Placement={'AvailabilityZone': availabilityZone, },
|
||||||
|
KeyName=keyName,
|
||||||
|
MinCount=1,
|
||||||
|
MaxCount=1,
|
||||||
|
UserData=userDataWebServer,
|
||||||
|
SecurityGroupIds=[
|
||||||
|
security_group_id,
|
||||||
|
],
|
||||||
|
|
||||||
|
TagSpecifications=[
|
||||||
|
{
|
||||||
|
'ResourceType': 'instance',
|
||||||
|
'Tags': [
|
||||||
|
{'Key': 'Name', 'Value': 'tug-of-war-webserver1'},
|
||||||
|
{'Key': 'tug-of-war', 'Value': 'installed'}
|
||||||
|
],
|
||||||
|
}
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
instanceIdDB = response['Instances'][0]['InstanceId']
|
||||||
|
privateIpDB = response['Instances'][0]['PrivateIpAddress']
|
||||||
|
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
||||||
|
|
||||||
|
instance = ec2Resource.Instance(instanceIdDB)
|
||||||
|
instance.wait_until_running()
|
@ -13,7 +13,7 @@ vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
|||||||
print("Deleting old instance...")
|
print("Deleting old instance...")
|
||||||
print("------------------------------------")
|
print("------------------------------------")
|
||||||
|
|
||||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}])
|
||||||
print(response)
|
print(response)
|
||||||
reservations = response['Reservations']
|
reservations = response['Reservations']
|
||||||
for reservation in reservations:
|
for reservation in reservations:
|
||||||
@ -28,18 +28,6 @@ print("Delete old security group...")
|
|||||||
print("------------------------------------")
|
print("------------------------------------")
|
||||||
|
|
||||||
try:
|
try:
|
||||||
response = ec2Client.delete_security_group(GroupName='coturn')
|
response = ec2Client.delete_security_group(GroupName='tug-of-war')
|
||||||
except ClientError as e:
|
except ClientError as e:
|
||||||
print(e)
|
print(e)
|
||||||
|
|
||||||
print("Delete old elastic ips...")
|
|
||||||
print("------------------------------------")
|
|
||||||
|
|
||||||
try:
|
|
||||||
response = ec2Client.describe_addresses(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}])
|
|
||||||
addresses = response['Addresses']
|
|
||||||
for address in addresses:
|
|
||||||
ec2Client.release_address(AllocationId=address['AllocationId'])
|
|
||||||
except ClientError as e:
|
|
||||||
print(e)
|
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user