Sebastian Rieger
5 years ago
7 changed files with 1161 additions and 957 deletions
-
BINaws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png
-
1090aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json
-
786aws-cloudformation-demo/cloudcomp-counter-demo.json
-
11demo3-microservice.py
-
179demo4-scale-out-add-worker.py
-
4demo4-scale-out-destroy.py
-
48demo4-scale-out.py
Before Width: 2163 | Height: 2163 | Size: 316 KiB After Width: 2046 | Height: 2046 | Size: 299 KiB |
1090
aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json
File diff suppressed because it is too large
View File
File diff suppressed because it is too large
View File
@ -1,394 +1,394 @@ |
|||||
{ |
|
||||
"AWSTemplateFormatVersion": "2010-09-09", |
|
||||
"Parameters": { |
|
||||
"paramImageID": { |
|
||||
"Type": "AWS::EC2::Image::Id", |
|
||||
"Default": "ami-f573e19a", |
|
||||
"Description": "Amazon Image ID" |
|
||||
}, |
|
||||
"paramInstanceType": { |
|
||||
"Type": "String", |
|
||||
"Default": "t2.nano", |
|
||||
"AllowedValues": [ |
|
||||
"t2.nano", |
|
||||
"t2.micro", |
|
||||
"m1.small" |
|
||||
], |
|
||||
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." |
|
||||
}, |
|
||||
"paramKeyPair": { |
|
||||
"Type": "AWS::EC2::KeyPair::KeyName", |
|
||||
"Description": "Amazon EC2 Key Pair" |
|
||||
}, |
|
||||
"paramIamInstanceRole": { |
|
||||
"Type": "String", |
|
||||
"Default": "ec2-s3-vertsys-access-role", |
|
||||
"Description": "IAM Instance Role" |
|
||||
}, |
|
||||
"paramVPC": { |
|
||||
"Type": "AWS::EC2::VPC::Id", |
|
||||
"Description": "VPC" |
|
||||
}, |
|
||||
"paramSubnetIDs": { |
|
||||
"Type": "List<AWS::EC2::Subnet::Id>", |
|
||||
"Description": "Subnet IDs" |
|
||||
}, |
|
||||
"paramAvailabilityZones": { |
|
||||
"Type": "List<AWS::EC2::AvailabilityZone::Name>", |
|
||||
"Description": "AvailabilityZones" |
|
||||
} |
|
||||
}, |
|
||||
"Resources": { |
|
||||
"lcVertSysAutoScaleConfigv11": { |
|
||||
"Type": "AWS::AutoScaling::LaunchConfiguration", |
|
||||
"Properties": { |
|
||||
"AssociatePublicIpAddress": true, |
|
||||
"ImageId": { |
|
||||
"Ref": "paramImageID" |
|
||||
}, |
|
||||
"InstanceType": { |
|
||||
"Ref": "paramInstanceType" |
|
||||
}, |
|
||||
"KeyName": { |
|
||||
"Ref": "paramKeyPair" |
|
||||
}, |
|
||||
"IamInstanceProfile": { |
|
||||
"Ref": "paramIamInstanceRole" |
|
||||
}, |
|
||||
"SecurityGroups": [ |
|
||||
{ |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
} |
|
||||
], |
|
||||
"UserData": { |
|
||||
"Fn::Base64": { |
|
||||
"Fn::Join": [ |
|
||||
"", |
|
||||
[ |
|
||||
"#!/bin/bash\n", |
|
||||
"\n", |
|
||||
"# this script will be run during the boot process by each VertSys instance created\n", |
|
||||
"# in AWS currently this is a plain bash script that requires a RedHat based image\n", |
|
||||
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", |
|
||||
"# distros\n", |
|
||||
"#\n", |
|
||||
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", |
|
||||
"\n", |
|
||||
"# Config\n", |
|
||||
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", |
|
||||
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", |
|
||||
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", |
|
||||
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", |
|
||||
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", |
|
||||
"\n", |
|
||||
"# Create path to run the script\n", |
|
||||
"mkdir $SCRIPT_ROOT_PATH\n", |
|
||||
"cd $SCRIPT_ROOT_PATH\n", |
|
||||
"\n", |
|
||||
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", |
|
||||
"wget http://169.254.169.254/latest/user-data\n", |
|
||||
"chmod +x user-data\n", |
|
||||
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", |
|
||||
"\n", |
|
||||
"# setting console prompt to include location (availability zone and region in AWS)\n", |
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", |
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", |
|
||||
"\n", |
|
||||
"# wait for internet connection, should not be necessary, but just in case ;)\n", |
|
||||
"while ! ping -c 1 -W 1 8.8.8.8; do\n", |
|
||||
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", |
|
||||
" sleep 1\n", |
|
||||
"done\n", |
|
||||
"\n", |
|
||||
"# installation of required packages\n", |
|
||||
"echo \"Installing packages...\"\n", |
|
||||
"sudo yum update -y\n", |
|
||||
"sudo yum install -y java git\n", |
|
||||
"#rm -rf verteilte-systeme-bsc-ai-examples\n", |
|
||||
"if [ ! -d $VERTSYS_PATH ]; then\n", |
|
||||
" echo \"Cloning repo...\"\n", |
|
||||
" git clone $REPO\n", |
|
||||
"fi\n", |
|
||||
"\n", |
|
||||
"# killall running screens, .e.g to cleanup if script is run again after boot\n", |
|
||||
"killall screen\n", |
|
||||
"# start all jars\n", |
|
||||
"echo \"Starting JARS: ${JARS}...\"\n", |
|
||||
"for JAR in $JARS; do\n", |
|
||||
" echo \"Starting ${JAR}...\"\n", |
|
||||
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", |
|
||||
"done\n", |
|
||||
"\n", |
|
||||
"# wait a second, to allow java services to start\n", |
|
||||
"sleep 1\n", |
|
||||
"\n", |
|
||||
"# output status of ports 36000-36199 and all running processes\n", |
|
||||
"echo \"Status:\"\n", |
|
||||
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", |
|
||||
"sudo ps aux | grep java\n", |
|
||||
"\n", |
|
||||
"# Example for path and contents:\n", |
|
||||
"#\n", |
|
||||
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", |
|
||||
"#\n", |
|
||||
"#build-server-jars.xml TCPServerMulti.jar\n", |
|
||||
"#RMIEchoServer.jar UDPServer.jar\n", |
|
||||
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", |
|
||||
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n", |
|
||||
"#TCPServer.jar\n" |
|
||||
] |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"sgCloudCompDemoSecurityGroup": { |
|
||||
"Type": "AWS::EC2::SecurityGroup", |
|
||||
"Properties": { |
|
||||
"GroupDescription": "CloudComp Counter Demo", |
|
||||
"VpcId": { |
|
||||
"Ref": "paramVPC" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"ingress1": { |
|
||||
"Type": "AWS::EC2::SecurityGroupIngress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "tcp", |
|
||||
"FromPort": "36037", |
|
||||
"ToPort": "36137", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"ingress2": { |
|
||||
"Type": "AWS::EC2::SecurityGroupIngress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "tcp", |
|
||||
"FromPort": "22", |
|
||||
"ToPort": "22", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"ingress3": { |
|
||||
"Type": "AWS::EC2::SecurityGroupIngress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "udp", |
|
||||
"FromPort": "36037", |
|
||||
"ToPort": "36137", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"egress1": { |
|
||||
"Type": "AWS::EC2::SecurityGroupEgress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "-1", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"asgCloudCompAutoScaleGroup": { |
|
||||
"Type": "AWS::AutoScaling::AutoScalingGroup", |
|
||||
"Properties": { |
|
||||
"AvailabilityZones": { |
|
||||
"Ref": "paramAvailabilityZones" |
|
||||
}, |
|
||||
"TargetGroupARNs": [ |
|
||||
{ |
|
||||
"Ref": "elbCloudCompTargetGroup" |
|
||||
} |
|
||||
], |
|
||||
"Cooldown": "30", |
|
||||
"DesiredCapacity": "1", |
|
||||
"HealthCheckGracePeriod": "60", |
|
||||
"HealthCheckType": "EC2", |
|
||||
"MaxSize": "3", |
|
||||
"MinSize": "1", |
|
||||
"VPCZoneIdentifier": { |
|
||||
"Ref": "paramSubnetIDs" |
|
||||
}, |
|
||||
"LaunchConfigurationName": { |
|
||||
"Ref": "lcVertSysAutoScaleConfigv11" |
|
||||
}, |
|
||||
"MetricsCollection": [ |
|
||||
{ |
|
||||
"Granularity": "1Minute", |
|
||||
"Metrics": [ |
|
||||
"GroupPendingInstances", |
|
||||
"GroupMinSize", |
|
||||
"GroupDesiredCapacity", |
|
||||
"GroupTerminatingInstances", |
|
||||
"GroupInServiceInstances", |
|
||||
"GroupStandbyInstances", |
|
||||
"GroupMaxSize", |
|
||||
"GroupTotalInstances" |
|
||||
] |
|
||||
} |
|
||||
], |
|
||||
"TerminationPolicies": [ |
|
||||
"Default" |
|
||||
] |
|
||||
} |
|
||||
}, |
|
||||
"sgCloudCompScalePolicy": { |
|
||||
"Type": "AWS::AutoScaling::ScalingPolicy", |
|
||||
"DependsOn": "elbCloudCompListener", |
|
||||
"Properties": { |
|
||||
"PolicyType": "TargetTrackingScaling", |
|
||||
"EstimatedInstanceWarmup": 60, |
|
||||
"TargetTrackingConfiguration": { |
|
||||
"DisableScaleIn": false, |
|
||||
"TargetValue": 5, |
|
||||
"PredefinedMetricSpecification": { |
|
||||
"PredefinedMetricType": "ALBRequestCountPerTarget", |
|
||||
"ResourceLabel": { |
|
||||
"Fn::Join": [ |
|
||||
"/", |
|
||||
[ |
|
||||
"app/elbCloudCompLoadBalancer", |
|
||||
{ |
|
||||
"Fn::Select": [ |
|
||||
"3", |
|
||||
{ |
|
||||
"Fn::Split": [ |
|
||||
"/", |
|
||||
{ |
|
||||
"Ref": "elbCloudCompLoadBalancer" |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
] |
|
||||
}, |
|
||||
"targetgroup/elbCloudCompTargetGroup", |
|
||||
{ |
|
||||
"Fn::Select": [ |
|
||||
"2", |
|
||||
{ |
|
||||
"Fn::Split": [ |
|
||||
"/", |
|
||||
{ |
|
||||
"Ref": "elbCloudCompTargetGroup" |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
] |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"AutoScalingGroupName": { |
|
||||
"Ref": "asgCloudCompAutoScaleGroup" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"elbCloudCompLoadBalancer": { |
|
||||
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", |
|
||||
"Properties": { |
|
||||
"Name": "elbCloudCompLoadBalancer", |
|
||||
"IpAddressType": "ipv4", |
|
||||
"Type": "application", |
|
||||
"Scheme": "internet-facing", |
|
||||
"SecurityGroups": [ |
|
||||
{ |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
} |
|
||||
], |
|
||||
"Subnets": { |
|
||||
"Ref": "paramSubnetIDs" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"elbCloudCompTargetGroup": { |
|
||||
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup", |
|
||||
"Properties": { |
|
||||
"Port": 36042, |
|
||||
"HealthCheckIntervalSeconds": 30, |
|
||||
"HealthCheckTimeoutSeconds": 5, |
|
||||
"HealthyThresholdCount": 2, |
|
||||
"UnhealthyThresholdCount": 2, |
|
||||
"HealthCheckPath": "/counter", |
|
||||
"HealthCheckProtocol": "HTTP", |
|
||||
"TargetGroupAttributes": [ |
|
||||
{ |
|
||||
"Key": "deregistration_delay.timeout_seconds", |
|
||||
"Value": "20" |
|
||||
} |
|
||||
], |
|
||||
"Protocol": "HTTP", |
|
||||
"TargetType": "instance", |
|
||||
"Matcher": { |
|
||||
"HttpCode": "200" |
|
||||
}, |
|
||||
"Name": "elbCloudCompTargetGroup", |
|
||||
"VpcId": { |
|
||||
"Ref": "paramVPC" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"elbCloudCompListener": { |
|
||||
"Type": "AWS::ElasticLoadBalancingV2::Listener", |
|
||||
"Properties": { |
|
||||
"LoadBalancerArn": { |
|
||||
"Ref": "elbCloudCompLoadBalancer" |
|
||||
}, |
|
||||
"Protocol": "HTTP", |
|
||||
"Port": 36042, |
|
||||
"DefaultActions": [ |
|
||||
{ |
|
||||
"Type": "forward", |
|
||||
"TargetGroupArn": { |
|
||||
"Ref": "elbCloudCompTargetGroup" |
|
||||
} |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"Outputs": { |
|
||||
"LoadBalancer": { |
|
||||
"Description": "Load Balancer", |
|
||||
"Value": { |
|
||||
"Ref": "elbCloudCompLoadBalancer" |
|
||||
} |
|
||||
}, |
|
||||
"LoadBalancerDns": { |
|
||||
"Description": "Load Balancer DNS", |
|
||||
"Value": { |
|
||||
"Fn::GetAtt": [ |
|
||||
"elbCloudCompLoadBalancer", |
|
||||
"DNSName" |
|
||||
] |
|
||||
} |
|
||||
}, |
|
||||
"LoadBalancerURL": { |
|
||||
"Description": "Load Balancer URL", |
|
||||
"Value": { |
|
||||
"Fn::Join": [ |
|
||||
":", |
|
||||
[ |
|
||||
{ |
|
||||
"Fn::GetAtt": [ |
|
||||
"elbCloudCompLoadBalancer", |
|
||||
"DNSName" |
|
||||
] |
|
||||
}, |
|
||||
"36042/counter" |
|
||||
] |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"Description": "CloudComp Counter Demo" |
|
||||
|
{ |
||||
|
"AWSTemplateFormatVersion": "2010-09-09", |
||||
|
"Parameters": { |
||||
|
"paramImageID": { |
||||
|
"Type": "AWS::EC2::Image::Id", |
||||
|
"Default": "ami-f573e19a", |
||||
|
"Description": "Amazon Image ID" |
||||
|
}, |
||||
|
"paramInstanceType": { |
||||
|
"Type": "String", |
||||
|
"Default": "t2.nano", |
||||
|
"AllowedValues": [ |
||||
|
"t2.nano", |
||||
|
"t2.micro", |
||||
|
"m1.small" |
||||
|
], |
||||
|
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." |
||||
|
}, |
||||
|
"paramKeyPair": { |
||||
|
"Type": "AWS::EC2::KeyPair::KeyName", |
||||
|
"Description": "Amazon EC2 Key Pair" |
||||
|
}, |
||||
|
"paramIamInstanceRole": { |
||||
|
"Type": "String", |
||||
|
"Default": "ec2-s3-vertsys-access-role", |
||||
|
"Description": "IAM Instance Role" |
||||
|
}, |
||||
|
"paramVPC": { |
||||
|
"Type": "AWS::EC2::VPC::Id", |
||||
|
"Description": "VPC" |
||||
|
}, |
||||
|
"paramSubnetIDs": { |
||||
|
"Type": "List<AWS::EC2::Subnet::Id>", |
||||
|
"Description": "Subnet IDs" |
||||
|
}, |
||||
|
"paramAvailabilityZones": { |
||||
|
"Type": "List<AWS::EC2::AvailabilityZone::Name>", |
||||
|
"Description": "AvailabilityZones" |
||||
|
} |
||||
|
}, |
||||
|
"Resources": { |
||||
|
"lcVertSysAutoScaleConfigv11": { |
||||
|
"Type": "AWS::AutoScaling::LaunchConfiguration", |
||||
|
"Properties": { |
||||
|
"AssociatePublicIpAddress": true, |
||||
|
"ImageId": { |
||||
|
"Ref": "paramImageID" |
||||
|
}, |
||||
|
"InstanceType": { |
||||
|
"Ref": "paramInstanceType" |
||||
|
}, |
||||
|
"KeyName": { |
||||
|
"Ref": "paramKeyPair" |
||||
|
}, |
||||
|
"IamInstanceProfile": { |
||||
|
"Ref": "paramIamInstanceRole" |
||||
|
}, |
||||
|
"SecurityGroups": [ |
||||
|
{ |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
} |
||||
|
], |
||||
|
"UserData": { |
||||
|
"Fn::Base64": { |
||||
|
"Fn::Join": [ |
||||
|
"", |
||||
|
[ |
||||
|
"#!/bin/bash\n", |
||||
|
"\n", |
||||
|
"# this script will be run during the boot process by each VertSys instance created\n", |
||||
|
"# in AWS currently this is a plain bash script that requires a RedHat based image\n", |
||||
|
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", |
||||
|
"# distros\n", |
||||
|
"#\n", |
||||
|
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", |
||||
|
"\n", |
||||
|
"# Config\n", |
||||
|
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", |
||||
|
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", |
||||
|
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", |
||||
|
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", |
||||
|
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", |
||||
|
"\n", |
||||
|
"# Create path to run the script\n", |
||||
|
"mkdir $SCRIPT_ROOT_PATH\n", |
||||
|
"cd $SCRIPT_ROOT_PATH\n", |
||||
|
"\n", |
||||
|
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", |
||||
|
"wget http://169.254.169.254/latest/user-data\n", |
||||
|
"chmod +x user-data\n", |
||||
|
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", |
||||
|
"\n", |
||||
|
"# setting console prompt to include location (availability zone and region in AWS)\n", |
||||
|
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", |
||||
|
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", |
||||
|
"\n", |
||||
|
"# wait for internet connection, should not be necessary, but just in case ;)\n", |
||||
|
"while ! ping -c 1 -W 1 8.8.8.8; do\n", |
||||
|
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", |
||||
|
" sleep 1\n", |
||||
|
"done\n", |
||||
|
"\n", |
||||
|
"# installation of required packages\n", |
||||
|
"echo \"Installing packages...\"\n", |
||||
|
"sudo yum update -y\n", |
||||
|
"sudo yum install -y java git\n", |
||||
|
"#rm -rf verteilte-systeme-bsc-ai-examples\n", |
||||
|
"if [ ! -d $VERTSYS_PATH ]; then\n", |
||||
|
" echo \"Cloning repo...\"\n", |
||||
|
" git clone $REPO\n", |
||||
|
"fi\n", |
||||
|
"\n", |
||||
|
"# killall running screens, .e.g to cleanup if script is run again after boot\n", |
||||
|
"killall screen\n", |
||||
|
"# start all jars\n", |
||||
|
"echo \"Starting JARS: ${JARS}...\"\n", |
||||
|
"for JAR in $JARS; do\n", |
||||
|
" echo \"Starting ${JAR}...\"\n", |
||||
|
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", |
||||
|
"done\n", |
||||
|
"\n", |
||||
|
"# wait a second, to allow java services to start\n", |
||||
|
"sleep 1\n", |
||||
|
"\n", |
||||
|
"# output status of ports 36000-36199 and all running processes\n", |
||||
|
"echo \"Status:\"\n", |
||||
|
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", |
||||
|
"sudo ps aux | grep java\n", |
||||
|
"\n", |
||||
|
"# Example for path and contents:\n", |
||||
|
"#\n", |
||||
|
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", |
||||
|
"#\n", |
||||
|
"#build-server-jars.xml TCPServerMulti.jar\n", |
||||
|
"#RMIEchoServer.jar UDPServer.jar\n", |
||||
|
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", |
||||
|
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n", |
||||
|
"#TCPServer.jar\n" |
||||
|
] |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"sgCloudCompDemoSecurityGroup": { |
||||
|
"Type": "AWS::EC2::SecurityGroup", |
||||
|
"Properties": { |
||||
|
"GroupDescription": "CloudComp Counter Demo", |
||||
|
"VpcId": { |
||||
|
"Ref": "paramVPC" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"ingress1": { |
||||
|
"Type": "AWS::EC2::SecurityGroupIngress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "tcp", |
||||
|
"FromPort": "36037", |
||||
|
"ToPort": "36137", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"ingress2": { |
||||
|
"Type": "AWS::EC2::SecurityGroupIngress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "tcp", |
||||
|
"FromPort": "22", |
||||
|
"ToPort": "22", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"ingress3": { |
||||
|
"Type": "AWS::EC2::SecurityGroupIngress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "udp", |
||||
|
"FromPort": "36037", |
||||
|
"ToPort": "36137", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"egress1": { |
||||
|
"Type": "AWS::EC2::SecurityGroupEgress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "-1", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"asgCloudCompAutoScaleGroup": { |
||||
|
"Type": "AWS::AutoScaling::AutoScalingGroup", |
||||
|
"Properties": { |
||||
|
"AvailabilityZones": { |
||||
|
"Ref": "paramAvailabilityZones" |
||||
|
}, |
||||
|
"TargetGroupARNs": [ |
||||
|
{ |
||||
|
"Ref": "elbCloudCompTargetGroup" |
||||
|
} |
||||
|
], |
||||
|
"Cooldown": "30", |
||||
|
"DesiredCapacity": "1", |
||||
|
"HealthCheckGracePeriod": "60", |
||||
|
"HealthCheckType": "EC2", |
||||
|
"MaxSize": "3", |
||||
|
"MinSize": "1", |
||||
|
"VPCZoneIdentifier": { |
||||
|
"Ref": "paramSubnetIDs" |
||||
|
}, |
||||
|
"LaunchConfigurationName": { |
||||
|
"Ref": "lcVertSysAutoScaleConfigv11" |
||||
|
}, |
||||
|
"MetricsCollection": [ |
||||
|
{ |
||||
|
"Granularity": "1Minute", |
||||
|
"Metrics": [ |
||||
|
"GroupPendingInstances", |
||||
|
"GroupMinSize", |
||||
|
"GroupDesiredCapacity", |
||||
|
"GroupTerminatingInstances", |
||||
|
"GroupInServiceInstances", |
||||
|
"GroupStandbyInstances", |
||||
|
"GroupMaxSize", |
||||
|
"GroupTotalInstances" |
||||
|
] |
||||
|
} |
||||
|
], |
||||
|
"TerminationPolicies": [ |
||||
|
"Default" |
||||
|
] |
||||
|
} |
||||
|
}, |
||||
|
"sgCloudCompScalePolicy": { |
||||
|
"Type": "AWS::AutoScaling::ScalingPolicy", |
||||
|
"DependsOn": "elbCloudCompListener", |
||||
|
"Properties": { |
||||
|
"PolicyType": "TargetTrackingScaling", |
||||
|
"EstimatedInstanceWarmup": 60, |
||||
|
"TargetTrackingConfiguration": { |
||||
|
"DisableScaleIn": false, |
||||
|
"TargetValue": 5, |
||||
|
"PredefinedMetricSpecification": { |
||||
|
"PredefinedMetricType": "ALBRequestCountPerTarget", |
||||
|
"ResourceLabel": { |
||||
|
"Fn::Join": [ |
||||
|
"/", |
||||
|
[ |
||||
|
"app/elbCloudCompLoadBalancer", |
||||
|
{ |
||||
|
"Fn::Select": [ |
||||
|
"3", |
||||
|
{ |
||||
|
"Fn::Split": [ |
||||
|
"/", |
||||
|
{ |
||||
|
"Ref": "elbCloudCompLoadBalancer" |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
] |
||||
|
}, |
||||
|
"targetgroup/elbCloudCompTargetGroup", |
||||
|
{ |
||||
|
"Fn::Select": [ |
||||
|
"2", |
||||
|
{ |
||||
|
"Fn::Split": [ |
||||
|
"/", |
||||
|
{ |
||||
|
"Ref": "elbCloudCompTargetGroup" |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
] |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"AutoScalingGroupName": { |
||||
|
"Ref": "asgCloudCompAutoScaleGroup" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"elbCloudCompLoadBalancer": { |
||||
|
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", |
||||
|
"Properties": { |
||||
|
"Name": "elbCloudCompLoadBalancer", |
||||
|
"IpAddressType": "ipv4", |
||||
|
"Type": "application", |
||||
|
"Scheme": "internet-facing", |
||||
|
"SecurityGroups": [ |
||||
|
{ |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
} |
||||
|
], |
||||
|
"Subnets": { |
||||
|
"Ref": "paramSubnetIDs" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"elbCloudCompTargetGroup": { |
||||
|
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup", |
||||
|
"Properties": { |
||||
|
"Port": 36042, |
||||
|
"HealthCheckIntervalSeconds": 30, |
||||
|
"HealthCheckTimeoutSeconds": 5, |
||||
|
"HealthyThresholdCount": 2, |
||||
|
"UnhealthyThresholdCount": 2, |
||||
|
"HealthCheckPath": "/counter", |
||||
|
"HealthCheckProtocol": "HTTP", |
||||
|
"TargetGroupAttributes": [ |
||||
|
{ |
||||
|
"Key": "deregistration_delay.timeout_seconds", |
||||
|
"Value": "20" |
||||
|
} |
||||
|
], |
||||
|
"Protocol": "HTTP", |
||||
|
"TargetType": "instance", |
||||
|
"Matcher": { |
||||
|
"HttpCode": "200" |
||||
|
}, |
||||
|
"Name": "elbCloudCompTargetGroup", |
||||
|
"VpcId": { |
||||
|
"Ref": "paramVPC" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"elbCloudCompListener": { |
||||
|
"Type": "AWS::ElasticLoadBalancingV2::Listener", |
||||
|
"Properties": { |
||||
|
"LoadBalancerArn": { |
||||
|
"Ref": "elbCloudCompLoadBalancer" |
||||
|
}, |
||||
|
"Protocol": "HTTP", |
||||
|
"Port": 36042, |
||||
|
"DefaultActions": [ |
||||
|
{ |
||||
|
"Type": "forward", |
||||
|
"TargetGroupArn": { |
||||
|
"Ref": "elbCloudCompTargetGroup" |
||||
|
} |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"Outputs": { |
||||
|
"LoadBalancer": { |
||||
|
"Description": "Load Balancer", |
||||
|
"Value": { |
||||
|
"Ref": "elbCloudCompLoadBalancer" |
||||
|
} |
||||
|
}, |
||||
|
"LoadBalancerDns": { |
||||
|
"Description": "Load Balancer DNS", |
||||
|
"Value": { |
||||
|
"Fn::GetAtt": [ |
||||
|
"elbCloudCompLoadBalancer", |
||||
|
"DNSName" |
||||
|
] |
||||
|
} |
||||
|
}, |
||||
|
"LoadBalancerURL": { |
||||
|
"Description": "Load Balancer URL", |
||||
|
"Value": { |
||||
|
"Fn::Join": [ |
||||
|
":", |
||||
|
[ |
||||
|
{ |
||||
|
"Fn::GetAtt": [ |
||||
|
"elbCloudCompLoadBalancer", |
||||
|
"DNSName" |
||||
|
] |
||||
|
}, |
||||
|
"36042/counter" |
||||
|
] |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"Description": "CloudComp Counter Demo" |
||||
} |
} |
@ -0,0 +1,179 @@ |
|||||
|
# import getpass |
||||
|
# import os |
||||
|
# import libcloud.security |
||||
|
|
||||
|
import time |
||||
|
from libcloud.compute.providers import get_driver |
||||
|
from libcloud.compute.types import Provider |
||||
|
|
||||
|
# reqs: |
||||
|
# services: nova, glance, neutron |
||||
|
# resources: 2 instances (m1.small), 2 floating ips (1 keypair, 2 security groups) |
||||
|
|
||||
|
# Please use 1-25 for X in username, project etc., as coordinated in the lab sessions |
||||
|
|
||||
|
# web service endpoint of the private cloud infrastructure |
||||
|
auth_url = 'https://private-cloud2.informatik.hs-fulda.de:5000' |
||||
|
# your username in OpenStack |
||||
|
auth_username = 'CloudCompX' |
||||
|
# your project in OpenStack |
||||
|
project_name = 'CloudCompGrpX' |
||||
|
|
||||
|
# default region |
||||
|
region_name = 'RegionOne' |
||||
|
# domain to use, "default" for local accounts, "hsfulda" for LDAP of DVZ, e.g., using fdaiXXXX as auth_username |
||||
|
domain_name = "default" |
||||
|
|
||||
|
ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image" |
||||
|
#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image" |
||||
|
|
||||
|
flavor_name = 'm1.small' |
||||
|
|
||||
|
network_name = "CloudCompGrpX-net" |
||||
|
|
||||
|
keypair_name = 'srieger-pub' |
||||
|
pub_key_file = '~/.ssh/id_rsa.pub' |
||||
|
|
||||
|
|
||||
|
|
||||
|
def main(): |
||||
|
########################################################################### |
||||
|
# |
||||
|
# get credentials |
||||
|
# |
||||
|
########################################################################### |
||||
|
|
||||
|
# if "OS_PASSWORD" in os.environ: |
||||
|
# auth_password = os.environ["OS_PASSWORD"] |
||||
|
# else: |
||||
|
# auth_password = getpass.getpass("Enter your OpenStack password:") |
||||
|
auth_password = "demo" |
||||
|
|
||||
|
########################################################################### |
||||
|
# |
||||
|
# create connection |
||||
|
# |
||||
|
########################################################################### |
||||
|
|
||||
|
# libcloud.security.VERIFY_SSL_CERT = False |
||||
|
|
||||
|
provider = get_driver(Provider.OPENSTACK) |
||||
|
conn = provider(auth_username, |
||||
|
auth_password, |
||||
|
ex_force_auth_url=auth_url, |
||||
|
ex_force_auth_version='3.x_password', |
||||
|
ex_tenant_name=project_name, |
||||
|
ex_force_service_region=region_name, |
||||
|
ex_domain_name=domain_name) |
||||
|
|
||||
|
########################################################################### |
||||
|
# |
||||
|
# get image, flavor, network for instance creation |
||||
|
# |
||||
|
########################################################################### |
||||
|
|
||||
|
images = conn.list_images() |
||||
|
image = '' |
||||
|
for img in images: |
||||
|
if img.name == ubuntu_image_name: |
||||
|
image = img |
||||
|
|
||||
|
flavors = conn.list_sizes() |
||||
|
flavor = '' |
||||
|
for flav in flavors: |
||||
|
if flav.name == flavor_name: |
||||
|
flavor = conn.ex_get_size(flav.id) |
||||
|
|
||||
|
networks = conn.ex_list_networks() |
||||
|
network = '' |
||||
|
for net in networks: |
||||
|
if net.name == network_name: |
||||
|
network = net |
||||
|
|
||||
|
########################################################################### |
||||
|
# |
||||
|
# get fixed a ip for serivice and api instance |
||||
|
# (better would be shared IP for the cluster etc.) |
||||
|
# |
||||
|
########################################################################### |
||||
|
|
||||
|
# find service instance |
||||
|
for instance in conn.list_nodes(): |
||||
|
if instance.name == 'app-services': |
||||
|
services_ip = instance.private_ips[0] |
||||
|
print('Found app-services fixed IP to be: ', services_ip) |
||||
|
if instance.name == 'app-api-1': |
||||
|
api_1_ip = instance.private_ips[0] |
||||
|
print('Found app-api-1 fixed IP to be: ', api_1_ip) |
||||
|
|
||||
|
########################################################################### |
||||
|
# |
||||
|
# create keypair dependency |
||||
|
# |
||||
|
########################################################################### |
||||
|
|
||||
|
print('Checking for existing SSH key pair...') |
||||
|
keypair_exists = False |
||||
|
for keypair in conn.list_key_pairs(): |
||||
|
if keypair.name == keypair_name: |
||||
|
keypair_exists = True |
||||
|
|
||||
|
if keypair_exists: |
||||
|
print('Keypair ' + keypair_name + ' already exists. Skipping import.') |
||||
|
else: |
||||
|
print('adding keypair...') |
||||
|
conn.import_key_pair_from_file(keypair_name, pub_key_file) |
||||
|
|
||||
|
for keypair in conn.list_key_pairs(): |
||||
|
print(keypair) |
||||
|
|
||||
|
########################################################################### |
||||
|
# |
||||
|
# create security group dependency |
||||
|
# |
||||
|
########################################################################### |
||||
|
|
||||
|
def get_security_group(connection, security_group_name): |
||||
|
"""A helper function to check if security group already exists""" |
||||
|
print('Checking for existing ' + security_group_name + ' security group...') |
||||
|
for security_grp in connection.ex_list_security_groups(): |
||||
|
if security_grp.name == security_group_name: |
||||
|
print('Security Group ' + security_group_name + ' already exists. Skipping creation.') |
||||
|
return security_grp |
||||
|
return False |
||||
|
|
||||
|
if not get_security_group(conn, "worker"): |
||||
|
worker_security_group = conn.ex_create_security_group('worker', 'for services that run on a worker node') |
||||
|
conn.ex_create_security_group_rule(worker_security_group, 'TCP', 22, 22) |
||||
|
else: |
||||
|
worker_security_group = get_security_group(conn, "worker") |
||||
|
|
||||
|
for security_group in conn.ex_list_security_groups(): |
||||
|
print(security_group) |
||||
|
|
||||
|
########################################################################### |
||||
|
# |
||||
|
# create worker instances |
||||
|
# |
||||
|
########################################################################### |
||||
|
|
||||
|
userdata_worker = '''#!/usr/bin/env bash |
||||
|
curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ |
||||
|
-i faafo -r worker -e 'http://%(api_1_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/' |
||||
|
''' % {'api_1_ip': api_1_ip, 'services_ip': services_ip} |
||||
|
|
||||
|
# userdata-api-2 = '''#!/usr/bin/env bash |
||||
|
# curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ |
||||
|
# -i faafo -r worker -e 'http://%(api_2_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/' |
||||
|
# ''' % {'api_2_ip': api_2_ip, 'services_ip': services_ip} |
||||
|
|
||||
|
print('Starting new app-worker-3 instance and wait until it is running...') |
||||
|
instance_worker_3 = conn.create_node(name='app-worker-3', |
||||
|
image=image, size=flavor, |
||||
|
networks=[network], |
||||
|
ex_keyname=keypair_name, |
||||
|
ex_userdata=userdata_worker, |
||||
|
ex_security_groups=[worker_security_group]) |
||||
|
|
||||
|
if __name__ == '__main__': |
||||
|
main() |
Write
Preview
Loading…
Cancel
Save
Reference in new issue