Browse Source

Merge remote-tracking branch 'origin/master'

master
Sebastian Rieger 6 years ago
parent
commit
7ff3cd8b44
  1. BIN
      aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png
  2. 1090
      aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json
  3. 786
      aws-cloudformation-demo/cloudcomp-counter-demo.json
  4. 11
      demo3-microservice.py
  5. 179
      demo4-scale-out-add-worker.py
  6. 4
      demo4-scale-out-destroy.py
  7. 48
      demo4-scale-out.py

BIN
aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png

Before

Width: 2163  |  Height: 2163  |  Size: 316 KiB

After

Width: 2046  |  Height: 2046  |  Size: 299 KiB

1090
aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json
File diff suppressed because it is too large
View File

786
aws-cloudformation-demo/cloudcomp-counter-demo.json

@ -1,394 +1,394 @@
{
"AWSTemplateFormatVersion": "2010-09-09",
"Parameters": {
"paramImageID": {
"Type": "AWS::EC2::Image::Id",
"Default": "ami-f573e19a",
"Description": "Amazon Image ID"
},
"paramInstanceType": {
"Type": "String",
"Default": "t2.nano",
"AllowedValues": [
"t2.nano",
"t2.micro",
"m1.small"
],
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro."
},
"paramKeyPair": {
"Type": "AWS::EC2::KeyPair::KeyName",
"Description": "Amazon EC2 Key Pair"
},
"paramIamInstanceRole": {
"Type": "String",
"Default": "ec2-s3-vertsys-access-role",
"Description": "IAM Instance Role"
},
"paramVPC": {
"Type": "AWS::EC2::VPC::Id",
"Description": "VPC"
},
"paramSubnetIDs": {
"Type": "List<AWS::EC2::Subnet::Id>",
"Description": "Subnet IDs"
},
"paramAvailabilityZones": {
"Type": "List<AWS::EC2::AvailabilityZone::Name>",
"Description": "AvailabilityZones"
}
},
"Resources": {
"lcVertSysAutoScaleConfigv11": {
"Type": "AWS::AutoScaling::LaunchConfiguration",
"Properties": {
"AssociatePublicIpAddress": true,
"ImageId": {
"Ref": "paramImageID"
},
"InstanceType": {
"Ref": "paramInstanceType"
},
"KeyName": {
"Ref": "paramKeyPair"
},
"IamInstanceProfile": {
"Ref": "paramIamInstanceRole"
},
"SecurityGroups": [
{
"Ref": "sgCloudCompDemoSecurityGroup"
}
],
"UserData": {
"Fn::Base64": {
"Fn::Join": [
"",
[
"#!/bin/bash\n",
"\n",
"# this script will be run during the boot process by each VertSys instance created\n",
"# in AWS currently this is a plain bash script that requires a RedHat based image\n",
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n",
"# distros\n",
"#\n",
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n",
"\n",
"# Config\n",
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n",
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n",
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n",
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n",
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n",
"\n",
"# Create path to run the script\n",
"mkdir $SCRIPT_ROOT_PATH\n",
"cd $SCRIPT_ROOT_PATH\n",
"\n",
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n",
"wget http://169.254.169.254/latest/user-data\n",
"chmod +x user-data\n",
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n",
"\n",
"# setting console prompt to include location (availability zone and region in AWS)\n",
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n",
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n",
"\n",
"# wait for internet connection, should not be necessary, but just in case ;)\n",
"while ! ping -c 1 -W 1 8.8.8.8; do\n",
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n",
" sleep 1\n",
"done\n",
"\n",
"# installation of required packages\n",
"echo \"Installing packages...\"\n",
"sudo yum update -y\n",
"sudo yum install -y java git\n",
"#rm -rf verteilte-systeme-bsc-ai-examples\n",
"if [ ! -d $VERTSYS_PATH ]; then\n",
" echo \"Cloning repo...\"\n",
" git clone $REPO\n",
"fi\n",
"\n",
"# killall running screens, .e.g to cleanup if script is run again after boot\n",
"killall screen\n",
"# start all jars\n",
"echo \"Starting JARS: ${JARS}...\"\n",
"for JAR in $JARS; do\n",
" echo \"Starting ${JAR}...\"\n",
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n",
"done\n",
"\n",
"# wait a second, to allow java services to start\n",
"sleep 1\n",
"\n",
"# output status of ports 36000-36199 and all running processes\n",
"echo \"Status:\"\n",
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n",
"sudo ps aux | grep java\n",
"\n",
"# Example for path and contents:\n",
"#\n",
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n",
"#\n",
"#build-server-jars.xml TCPServerMulti.jar\n",
"#RMIEchoServer.jar UDPServer.jar\n",
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n",
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n",
"#TCPServer.jar\n"
]
]
}
}
}
},
"sgCloudCompDemoSecurityGroup": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
"GroupDescription": "CloudComp Counter Demo",
"VpcId": {
"Ref": "paramVPC"
}
}
},
"ingress1": {
"Type": "AWS::EC2::SecurityGroupIngress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "tcp",
"FromPort": "36037",
"ToPort": "36137",
"CidrIp": "0.0.0.0/0"
}
},
"ingress2": {
"Type": "AWS::EC2::SecurityGroupIngress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "tcp",
"FromPort": "22",
"ToPort": "22",
"CidrIp": "0.0.0.0/0"
}
},
"ingress3": {
"Type": "AWS::EC2::SecurityGroupIngress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "udp",
"FromPort": "36037",
"ToPort": "36137",
"CidrIp": "0.0.0.0/0"
}
},
"egress1": {
"Type": "AWS::EC2::SecurityGroupEgress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "-1",
"CidrIp": "0.0.0.0/0"
}
},
"asgCloudCompAutoScaleGroup": {
"Type": "AWS::AutoScaling::AutoScalingGroup",
"Properties": {
"AvailabilityZones": {
"Ref": "paramAvailabilityZones"
},
"TargetGroupARNs": [
{
"Ref": "elbCloudCompTargetGroup"
}
],
"Cooldown": "30",
"DesiredCapacity": "1",
"HealthCheckGracePeriod": "60",
"HealthCheckType": "EC2",
"MaxSize": "3",
"MinSize": "1",
"VPCZoneIdentifier": {
"Ref": "paramSubnetIDs"
},
"LaunchConfigurationName": {
"Ref": "lcVertSysAutoScaleConfigv11"
},
"MetricsCollection": [
{
"Granularity": "1Minute",
"Metrics": [
"GroupPendingInstances",
"GroupMinSize",
"GroupDesiredCapacity",
"GroupTerminatingInstances",
"GroupInServiceInstances",
"GroupStandbyInstances",
"GroupMaxSize",
"GroupTotalInstances"
]
}
],
"TerminationPolicies": [
"Default"
]
}
},
"sgCloudCompScalePolicy": {
"Type": "AWS::AutoScaling::ScalingPolicy",
"DependsOn": "elbCloudCompListener",
"Properties": {
"PolicyType": "TargetTrackingScaling",
"EstimatedInstanceWarmup": 60,
"TargetTrackingConfiguration": {
"DisableScaleIn": false,
"TargetValue": 5,
"PredefinedMetricSpecification": {
"PredefinedMetricType": "ALBRequestCountPerTarget",
"ResourceLabel": {
"Fn::Join": [
"/",
[
"app/elbCloudCompLoadBalancer",
{
"Fn::Select": [
"3",
{
"Fn::Split": [
"/",
{
"Ref": "elbCloudCompLoadBalancer"
}
]
}
]
},
"targetgroup/elbCloudCompTargetGroup",
{
"Fn::Select": [
"2",
{
"Fn::Split": [
"/",
{
"Ref": "elbCloudCompTargetGroup"
}
]
}
]
}
]
]
}
}
},
"AutoScalingGroupName": {
"Ref": "asgCloudCompAutoScaleGroup"
}
}
},
"elbCloudCompLoadBalancer": {
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer",
"Properties": {
"Name": "elbCloudCompLoadBalancer",
"IpAddressType": "ipv4",
"Type": "application",
"Scheme": "internet-facing",
"SecurityGroups": [
{
"Ref": "sgCloudCompDemoSecurityGroup"
}
],
"Subnets": {
"Ref": "paramSubnetIDs"
}
}
},
"elbCloudCompTargetGroup": {
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup",
"Properties": {
"Port": 36042,
"HealthCheckIntervalSeconds": 30,
"HealthCheckTimeoutSeconds": 5,
"HealthyThresholdCount": 2,
"UnhealthyThresholdCount": 2,
"HealthCheckPath": "/counter",
"HealthCheckProtocol": "HTTP",
"TargetGroupAttributes": [
{
"Key": "deregistration_delay.timeout_seconds",
"Value": "20"
}
],
"Protocol": "HTTP",
"TargetType": "instance",
"Matcher": {
"HttpCode": "200"
},
"Name": "elbCloudCompTargetGroup",
"VpcId": {
"Ref": "paramVPC"
}
}
},
"elbCloudCompListener": {
"Type": "AWS::ElasticLoadBalancingV2::Listener",
"Properties": {
"LoadBalancerArn": {
"Ref": "elbCloudCompLoadBalancer"
},
"Protocol": "HTTP",
"Port": 36042,
"DefaultActions": [
{
"Type": "forward",
"TargetGroupArn": {
"Ref": "elbCloudCompTargetGroup"
}
}
]
}
}
},
"Outputs": {
"LoadBalancer": {
"Description": "Load Balancer",
"Value": {
"Ref": "elbCloudCompLoadBalancer"
}
},
"LoadBalancerDns": {
"Description": "Load Balancer DNS",
"Value": {
"Fn::GetAtt": [
"elbCloudCompLoadBalancer",
"DNSName"
]
}
},
"LoadBalancerURL": {
"Description": "Load Balancer URL",
"Value": {
"Fn::Join": [
":",
[
{
"Fn::GetAtt": [
"elbCloudCompLoadBalancer",
"DNSName"
]
},
"36042/counter"
]
]
}
}
},
"Description": "CloudComp Counter Demo"
{
"AWSTemplateFormatVersion": "2010-09-09",
"Parameters": {
"paramImageID": {
"Type": "AWS::EC2::Image::Id",
"Default": "ami-f573e19a",
"Description": "Amazon Image ID"
},
"paramInstanceType": {
"Type": "String",
"Default": "t2.nano",
"AllowedValues": [
"t2.nano",
"t2.micro",
"m1.small"
],
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro."
},
"paramKeyPair": {
"Type": "AWS::EC2::KeyPair::KeyName",
"Description": "Amazon EC2 Key Pair"
},
"paramIamInstanceRole": {
"Type": "String",
"Default": "ec2-s3-vertsys-access-role",
"Description": "IAM Instance Role"
},
"paramVPC": {
"Type": "AWS::EC2::VPC::Id",
"Description": "VPC"
},
"paramSubnetIDs": {
"Type": "List<AWS::EC2::Subnet::Id>",
"Description": "Subnet IDs"
},
"paramAvailabilityZones": {
"Type": "List<AWS::EC2::AvailabilityZone::Name>",
"Description": "AvailabilityZones"
}
},
"Resources": {
"lcVertSysAutoScaleConfigv11": {
"Type": "AWS::AutoScaling::LaunchConfiguration",
"Properties": {
"AssociatePublicIpAddress": true,
"ImageId": {
"Ref": "paramImageID"
},
"InstanceType": {
"Ref": "paramInstanceType"
},
"KeyName": {
"Ref": "paramKeyPair"
},
"IamInstanceProfile": {
"Ref": "paramIamInstanceRole"
},
"SecurityGroups": [
{
"Ref": "sgCloudCompDemoSecurityGroup"
}
],
"UserData": {
"Fn::Base64": {
"Fn::Join": [
"",
[
"#!/bin/bash\n",
"\n",
"# this script will be run during the boot process by each VertSys instance created\n",
"# in AWS currently this is a plain bash script that requires a RedHat based image\n",
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n",
"# distros\n",
"#\n",
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n",
"\n",
"# Config\n",
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n",
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n",
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n",
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n",
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n",
"\n",
"# Create path to run the script\n",
"mkdir $SCRIPT_ROOT_PATH\n",
"cd $SCRIPT_ROOT_PATH\n",
"\n",
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n",
"wget http://169.254.169.254/latest/user-data\n",
"chmod +x user-data\n",
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n",
"\n",
"# setting console prompt to include location (availability zone and region in AWS)\n",
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n",
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n",
"\n",
"# wait for internet connection, should not be necessary, but just in case ;)\n",
"while ! ping -c 1 -W 1 8.8.8.8; do\n",
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n",
" sleep 1\n",
"done\n",
"\n",
"# installation of required packages\n",
"echo \"Installing packages...\"\n",
"sudo yum update -y\n",
"sudo yum install -y java git\n",
"#rm -rf verteilte-systeme-bsc-ai-examples\n",
"if [ ! -d $VERTSYS_PATH ]; then\n",
" echo \"Cloning repo...\"\n",
" git clone $REPO\n",
"fi\n",
"\n",
"# killall running screens, .e.g to cleanup if script is run again after boot\n",
"killall screen\n",
"# start all jars\n",
"echo \"Starting JARS: ${JARS}...\"\n",
"for JAR in $JARS; do\n",
" echo \"Starting ${JAR}...\"\n",
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n",
"done\n",
"\n",
"# wait a second, to allow java services to start\n",
"sleep 1\n",
"\n",
"# output status of ports 36000-36199 and all running processes\n",
"echo \"Status:\"\n",
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n",
"sudo ps aux | grep java\n",
"\n",
"# Example for path and contents:\n",
"#\n",
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n",
"#\n",
"#build-server-jars.xml TCPServerMulti.jar\n",
"#RMIEchoServer.jar UDPServer.jar\n",
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n",
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n",
"#TCPServer.jar\n"
]
]
}
}
}
},
"sgCloudCompDemoSecurityGroup": {
"Type": "AWS::EC2::SecurityGroup",
"Properties": {
"GroupDescription": "CloudComp Counter Demo",
"VpcId": {
"Ref": "paramVPC"
}
}
},
"ingress1": {
"Type": "AWS::EC2::SecurityGroupIngress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "tcp",
"FromPort": "36037",
"ToPort": "36137",
"CidrIp": "0.0.0.0/0"
}
},
"ingress2": {
"Type": "AWS::EC2::SecurityGroupIngress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "tcp",
"FromPort": "22",
"ToPort": "22",
"CidrIp": "0.0.0.0/0"
}
},
"ingress3": {
"Type": "AWS::EC2::SecurityGroupIngress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "udp",
"FromPort": "36037",
"ToPort": "36137",
"CidrIp": "0.0.0.0/0"
}
},
"egress1": {
"Type": "AWS::EC2::SecurityGroupEgress",
"Properties": {
"GroupId": {
"Ref": "sgCloudCompDemoSecurityGroup"
},
"IpProtocol": "-1",
"CidrIp": "0.0.0.0/0"
}
},
"asgCloudCompAutoScaleGroup": {
"Type": "AWS::AutoScaling::AutoScalingGroup",
"Properties": {
"AvailabilityZones": {
"Ref": "paramAvailabilityZones"
},
"TargetGroupARNs": [
{
"Ref": "elbCloudCompTargetGroup"
}
],
"Cooldown": "30",
"DesiredCapacity": "1",
"HealthCheckGracePeriod": "60",
"HealthCheckType": "EC2",
"MaxSize": "3",
"MinSize": "1",
"VPCZoneIdentifier": {
"Ref": "paramSubnetIDs"
},
"LaunchConfigurationName": {
"Ref": "lcVertSysAutoScaleConfigv11"
},
"MetricsCollection": [
{
"Granularity": "1Minute",
"Metrics": [
"GroupPendingInstances",
"GroupMinSize",
"GroupDesiredCapacity",
"GroupTerminatingInstances",
"GroupInServiceInstances",
"GroupStandbyInstances",
"GroupMaxSize",
"GroupTotalInstances"
]
}
],
"TerminationPolicies": [
"Default"
]
}
},
"sgCloudCompScalePolicy": {
"Type": "AWS::AutoScaling::ScalingPolicy",
"DependsOn": "elbCloudCompListener",
"Properties": {
"PolicyType": "TargetTrackingScaling",
"EstimatedInstanceWarmup": 60,
"TargetTrackingConfiguration": {
"DisableScaleIn": false,
"TargetValue": 5,
"PredefinedMetricSpecification": {
"PredefinedMetricType": "ALBRequestCountPerTarget",
"ResourceLabel": {
"Fn::Join": [
"/",
[
"app/elbCloudCompLoadBalancer",
{
"Fn::Select": [
"3",
{
"Fn::Split": [
"/",
{
"Ref": "elbCloudCompLoadBalancer"
}
]
}
]
},
"targetgroup/elbCloudCompTargetGroup",
{
"Fn::Select": [
"2",
{
"Fn::Split": [
"/",
{
"Ref": "elbCloudCompTargetGroup"
}
]
}
]
}
]
]
}
}
},
"AutoScalingGroupName": {
"Ref": "asgCloudCompAutoScaleGroup"
}
}
},
"elbCloudCompLoadBalancer": {
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer",
"Properties": {
"Name": "elbCloudCompLoadBalancer",
"IpAddressType": "ipv4",
"Type": "application",
"Scheme": "internet-facing",
"SecurityGroups": [
{
"Ref": "sgCloudCompDemoSecurityGroup"
}
],
"Subnets": {
"Ref": "paramSubnetIDs"
}
}
},
"elbCloudCompTargetGroup": {
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup",
"Properties": {
"Port": 36042,
"HealthCheckIntervalSeconds": 30,
"HealthCheckTimeoutSeconds": 5,
"HealthyThresholdCount": 2,
"UnhealthyThresholdCount": 2,
"HealthCheckPath": "/counter",
"HealthCheckProtocol": "HTTP",
"TargetGroupAttributes": [
{
"Key": "deregistration_delay.timeout_seconds",
"Value": "20"
}
],
"Protocol": "HTTP",
"TargetType": "instance",
"Matcher": {
"HttpCode": "200"
},
"Name": "elbCloudCompTargetGroup",
"VpcId": {
"Ref": "paramVPC"
}
}
},
"elbCloudCompListener": {
"Type": "AWS::ElasticLoadBalancingV2::Listener",
"Properties": {
"LoadBalancerArn": {
"Ref": "elbCloudCompLoadBalancer"
},
"Protocol": "HTTP",
"Port": 36042,
"DefaultActions": [
{
"Type": "forward",
"TargetGroupArn": {
"Ref": "elbCloudCompTargetGroup"
}
}
]
}
}
},
"Outputs": {
"LoadBalancer": {
"Description": "Load Balancer",
"Value": {
"Ref": "elbCloudCompLoadBalancer"
}
},
"LoadBalancerDns": {
"Description": "Load Balancer DNS",
"Value": {
"Fn::GetAtt": [
"elbCloudCompLoadBalancer",
"DNSName"
]
}
},
"LoadBalancerURL": {
"Description": "Load Balancer URL",
"Value": {
"Fn::Join": [
":",
[
{
"Fn::GetAtt": [
"elbCloudCompLoadBalancer",
"DNSName"
]
},
"36042/counter"
]
]
}
}
},
"Description": "CloudComp Counter Demo"
}

11
demo3-microservice.py

@ -23,6 +23,7 @@ region_name = 'RegionOne'
domain_name = "default"
ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image"
#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image"
flavor_name = 'm1.small'
@ -153,10 +154,20 @@ def main():
#
###########################################################################
# https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh
# is currently broken, hence the "rabbitctl" lines were added in the example
# below, see also https://bugs.launchpad.net/faafo/+bug/1679710
#
# Thanks to Stefan Friedmann for finding this fix ;)
userdata = '''#!/usr/bin/env bash
curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \
-i messaging -i faafo -r api
rabbitmqctl add_user faafo guest
rabbitmqctl set_user_tags faafo administrator
rabbitmqctl set_permissions -p / faafo ".*" ".*" ".*"
'''
print('Starting new app-controller instance and wait until it is running...')
instance_controller_1 = conn.create_node(name='app-controller',

179
demo4-scale-out-add-worker.py

@ -0,0 +1,179 @@
# import getpass
# import os
# import libcloud.security
import time
from libcloud.compute.providers import get_driver
from libcloud.compute.types import Provider
# reqs:
# services: nova, glance, neutron
# resources: 2 instances (m1.small), 2 floating ips (1 keypair, 2 security groups)
# Please use 1-25 for X in username, project etc., as coordinated in the lab sessions
# web service endpoint of the private cloud infrastructure
auth_url = 'https://private-cloud2.informatik.hs-fulda.de:5000'
# your username in OpenStack
auth_username = 'CloudCompX'
# your project in OpenStack
project_name = 'CloudCompGrpX'
# default region
region_name = 'RegionOne'
# domain to use, "default" for local accounts, "hsfulda" for LDAP of DVZ, e.g., using fdaiXXXX as auth_username
domain_name = "default"
ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image"
#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image"
flavor_name = 'm1.small'
network_name = "CloudCompGrpX-net"
keypair_name = 'srieger-pub'
pub_key_file = '~/.ssh/id_rsa.pub'
def main():
###########################################################################
#
# get credentials
#
###########################################################################
# if "OS_PASSWORD" in os.environ:
# auth_password = os.environ["OS_PASSWORD"]
# else:
# auth_password = getpass.getpass("Enter your OpenStack password:")
auth_password = "demo"
###########################################################################
#
# create connection
#
###########################################################################
# libcloud.security.VERIFY_SSL_CERT = False
provider = get_driver(Provider.OPENSTACK)
conn = provider(auth_username,
auth_password,
ex_force_auth_url=auth_url,
ex_force_auth_version='3.x_password',
ex_tenant_name=project_name,
ex_force_service_region=region_name,
ex_domain_name=domain_name)
###########################################################################
#
# get image, flavor, network for instance creation
#
###########################################################################
images = conn.list_images()
image = ''
for img in images:
if img.name == ubuntu_image_name:
image = img
flavors = conn.list_sizes()
flavor = ''
for flav in flavors:
if flav.name == flavor_name:
flavor = conn.ex_get_size(flav.id)
networks = conn.ex_list_networks()
network = ''
for net in networks:
if net.name == network_name:
network = net
###########################################################################
#
# get fixed a ip for serivice and api instance
# (better would be shared IP for the cluster etc.)
#
###########################################################################
# find service instance
for instance in conn.list_nodes():
if instance.name == 'app-services':
services_ip = instance.private_ips[0]
print('Found app-services fixed IP to be: ', services_ip)
if instance.name == 'app-api-1':
api_1_ip = instance.private_ips[0]
print('Found app-api-1 fixed IP to be: ', api_1_ip)
###########################################################################
#
# create keypair dependency
#
###########################################################################
print('Checking for existing SSH key pair...')
keypair_exists = False
for keypair in conn.list_key_pairs():
if keypair.name == keypair_name:
keypair_exists = True
if keypair_exists:
print('Keypair ' + keypair_name + ' already exists. Skipping import.')
else:
print('adding keypair...')
conn.import_key_pair_from_file(keypair_name, pub_key_file)
for keypair in conn.list_key_pairs():
print(keypair)
###########################################################################
#
# create security group dependency
#
###########################################################################
def get_security_group(connection, security_group_name):
"""A helper function to check if security group already exists"""
print('Checking for existing ' + security_group_name + ' security group...')
for security_grp in connection.ex_list_security_groups():
if security_grp.name == security_group_name:
print('Security Group ' + security_group_name + ' already exists. Skipping creation.')
return security_grp
return False
if not get_security_group(conn, "worker"):
worker_security_group = conn.ex_create_security_group('worker', 'for services that run on a worker node')
conn.ex_create_security_group_rule(worker_security_group, 'TCP', 22, 22)
else:
worker_security_group = get_security_group(conn, "worker")
for security_group in conn.ex_list_security_groups():
print(security_group)
###########################################################################
#
# create worker instances
#
###########################################################################
userdata_worker = '''#!/usr/bin/env bash
curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \
-i faafo -r worker -e 'http://%(api_1_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/'
''' % {'api_1_ip': api_1_ip, 'services_ip': services_ip}
# userdata-api-2 = '''#!/usr/bin/env bash
# curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \
# -i faafo -r worker -e 'http://%(api_2_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/'
# ''' % {'api_2_ip': api_2_ip, 'services_ip': services_ip}
print('Starting new app-worker-3 instance and wait until it is running...')
instance_worker_3 = conn.create_node(name='app-worker-3',
image=image, size=flavor,
networks=[network],
ex_keyname=keypair_name,
ex_userdata=userdata_worker,
ex_security_groups=[worker_security_group])
if __name__ == '__main__':
main()

4
demo4-scale-out-destroy.py

@ -25,6 +25,7 @@ region_name = 'RegionOne'
domain_name = "default"
ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image"
#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image"
flavor_name = 'm1.small'
@ -85,7 +86,8 @@ def main():
instances = conn.list_nodes()
for instance in instances:
# if we see any demo instances still running continue to wait for them to stop
if instance.name in ['all-in-one', 'app-worker-1', 'app-worker-2', 'app-controller']:
if instance.name in ['all-in-one', 'app-worker-1', 'app-worker-2', 'app-worker-3', 'app-controller',
'app-services', 'app-api-1', 'app-api-2']:
nodes_still_running = True
print('There are still instances running, waiting for them to be destroyed...')

48
demo4-scale-out.py

@ -25,6 +25,7 @@ region_name = 'RegionOne'
domain_name = "default"
ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image"
#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image"
flavor_name = 'm1.small'
@ -214,9 +215,18 @@ def main():
#
###########################################################################
userdata = '''#!/usr/bin/env bash
# https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh
# is currently broken, hence the "rabbitctl" lines were added in the example
# below, see also https://bugs.launchpad.net/faafo/+bug/1679710
#
# Thanks to Stefan Friedmann for finding this fix ;)
userdata_service = '''#!/usr/bin/env bash
curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \
-i database -i messaging
rabbitmqctl add_user faafo guest
rabbitmqctl set_user_tags faafo administrator
rabbitmqctl set_permissions -p / faafo ".*" ".*" ".*"
'''
print('Starting new app-services instance and wait until it is running...')
@ -225,7 +235,7 @@ def main():
size=flavor,
networks=[network],
ex_keyname=keypair_name,
ex_userdata=userdata,
ex_userdata=userdata_service,
ex_security_groups=[services_security_group])
instance_services = conn.wait_until_running(nodes=[instance_services], timeout=120,
ssh_interface='private_ips')[0][0]
@ -237,7 +247,7 @@ def main():
#
###########################################################################
userdata = '''#!/usr/bin/env bash
userdata_api = '''#!/usr/bin/env bash
curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \
-i faafo -r api -m 'amqp://guest:guest@%(services_ip)s:5672/' \
-d 'mysql+pymysql://faafo:password@%(services_ip)s:3306/faafo'
@ -249,7 +259,7 @@ def main():
size=flavor,
networks=[network],
ex_keyname=keypair_name,
ex_userdata=userdata,
ex_userdata=userdata_api,
ex_security_groups=[api_security_group])
print('Starting new app-api-2 instance and wait until it is running...')
@ -258,7 +268,7 @@ def main():
size=flavor,
networks=[network],
ex_keyname=keypair_name,
ex_userdata=userdata,
ex_userdata=userdata_api,
ex_security_groups=[api_security_group])
instance_api_1 = conn.wait_until_running(nodes=[instance_api_1], timeout=120,
@ -279,12 +289,12 @@ def main():
#
###########################################################################
userdata_api_1 = '''#!/usr/bin/env bash
userdata_worker = '''#!/usr/bin/env bash
curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \
-i faafo -r worker -e 'http://%(api_1_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/'
''' % {'api_1_ip': api_1_ip, 'services_ip': services_ip}
# userdata-api-2 = '''#!/usr/bin/env bash
# userdata_api-api-2 = '''#!/usr/bin/env bash
# curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \
# -i faafo -r worker -e 'http://%(api_2_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/'
# ''' % {'api_2_ip': api_2_ip, 'services_ip': services_ip}
@ -294,28 +304,30 @@ def main():
image=image, size=flavor,
networks=[network],
ex_keyname=keypair_name,
ex_userdata=userdata_api_1,
ex_userdata=userdata_worker,
ex_security_groups=[worker_security_group])
print('Starting new app-worker-1 instance and wait until it is running...')
print('Starting new app-worker-2 instance and wait until it is running...')
instance_worker_2 = conn.create_node(name='app-worker-2',
image=image, size=flavor,
networks=[network],
ex_keyname=keypair_name,
ex_userdata=userdata_api_1,
ex_userdata=userdata_worker,
ex_security_groups=[worker_security_group])
print('Starting new app-worker-1 instance and wait until it is running...')
instance_worker_3 = conn.create_node(name='app-worker-3',
image=image, size=flavor,
networks=[network],
ex_keyname=keypair_name,
ex_userdata=userdata_api_1,
ex_security_groups=[worker_security_group])
# do not start worker 3 initially, can be started using scale-out-add-worker.py demo
#print('Starting new app-worker-3 instance and wait until it is running...')
#instance_worker_3 = conn.create_node(name='app-worker-3',
# image=image, size=flavor,
# networks=[network],
# ex_keyname=keypair_name,
# ex_userdata=userdata_worker,
# ex_security_groups=[worker_security_group])
print(instance_worker_1)
print(instance_worker_2)
print(instance_worker_3)
#print(instance_worker_3)
if __name__ == '__main__':

Loading…
Cancel
Save