You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
321 lines
11 KiB
321 lines
11 KiB
import time
|
|
|
|
import boto3
|
|
from botocore.exceptions import ClientError
|
|
|
|
region = 'eu-central-1'
|
|
availabilityZone = 'eu-central-1b'
|
|
imageId = 'ami-0cc293023f983ed53'
|
|
instanceType = 't3.nano'
|
|
keyName = 'srieger-pub'
|
|
subnet1 = 'subnet-41422b28'
|
|
subnet2 = 'subnet-5c5f6d16'
|
|
subnet3 = 'subnet-6f2ea214'
|
|
|
|
userDataDB = ('#!/bin/bash\n'
|
|
'#!/bin/bash\n'
|
|
'# extra repo for RedHat rpms\n'
|
|
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
|
'# essential tools\n'
|
|
'yum install -y joe htop git\n'
|
|
'# mysql\n'
|
|
'yum install -y mariadb mariadb-server\n'
|
|
'\n'
|
|
'service mariadb start\n'
|
|
'\n'
|
|
'echo "create database cloud_tug_of_war" | mysql -u root\n'
|
|
'\n'
|
|
'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n'
|
|
'\n'
|
|
'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloudpass\';" | mysql -u root\n'
|
|
'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n'
|
|
'echo "FLUSH PRIVILEGES" | mysql -u root\n'
|
|
)
|
|
|
|
# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/"
|
|
|
|
client = boto3.setup_default_session(region_name=region)
|
|
ec2Client = boto3.client("ec2")
|
|
ec2Resource = boto3.resource('ec2')
|
|
|
|
response = ec2Client.describe_vpcs()
|
|
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
|
|
|
|
elbv2Client = boto3.client('elbv2')
|
|
asClient = boto3.client('autoscaling')
|
|
|
|
print("Deleting auto scaling group...")
|
|
print("------------------------------------")
|
|
|
|
try:
|
|
response = asClient.delete_auto_scaling_group(AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', ForceDelete=True)
|
|
except ClientError as e:
|
|
print(e)
|
|
|
|
print("Deleting launch configuration...")
|
|
print("------------------------------------")
|
|
|
|
try:
|
|
response = asClient.delete_launch_configuration(LaunchConfigurationName='tug-of-war-asg-launchconfig')
|
|
except ClientError as e:
|
|
print(e)
|
|
|
|
|
|
|
|
print("Deleting old instances...")
|
|
print("------------------------------------")
|
|
|
|
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war-asg']}])
|
|
print(response)
|
|
reservations = response['Reservations']
|
|
for reservation in reservations:
|
|
for instance in reservation['Instances']:
|
|
if instance['State']['Name'] == "running":
|
|
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
|
|
print(response)
|
|
instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
|
|
instanceToTerminate.wait_until_terminated()
|
|
|
|
|
|
print("Deleting load balancer and deps...")
|
|
print("------------------------------------")
|
|
|
|
try:
|
|
response = elbv2Client.describe_load_balancers(Names=['tug-of-war-asg-loadbalancer'])
|
|
loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '')
|
|
response = elbv2Client.delete_load_balancer(LoadBalancerArn=loadbalancer_arn)
|
|
|
|
waiter = elbv2Client.get_waiter('load_balancers_deleted')
|
|
waiter.wait(LoadBalancerArns=[loadbalancer_arn])
|
|
except ClientError as e:
|
|
print(e)
|
|
|
|
try:
|
|
response = elbv2Client.describe_target_groups(Names=['tug-of-war-asg-targetgroup'])
|
|
while len(response.get('TargetGroups', [{}])) > 0:
|
|
targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '')
|
|
try:
|
|
response = elbv2Client.delete_target_group(TargetGroupArn=targetgroup_arn)
|
|
except ClientError as e:
|
|
print(e)
|
|
response = elbv2Client.describe_target_groups(Names=['tug-of-war-asg-targetgroup'])
|
|
time.sleep(5)
|
|
except ClientError as e:
|
|
print(e)
|
|
|
|
print("Delete old security group...")
|
|
print("------------------------------------")
|
|
|
|
try:
|
|
response = ec2Client.describe_security_groups(Filters=[{'Name': 'group-name', 'Values': ['tug-of-war-asg']}])
|
|
while len(response.get('SecurityGroups', [{}])) > 0:
|
|
security_group_id = response.get('SecurityGroups', [{}])[0].get('GroupId', '')
|
|
try:
|
|
response = ec2Client.delete_security_group(GroupName='tug-of-war-asg')
|
|
except ClientError as e:
|
|
print(e)
|
|
response = ec2Client.describe_security_groups(Filters=[{'Name': 'group-name', 'Values': ['tug-of-war-asg']}])
|
|
time.sleep(5)
|
|
except ClientError as e:
|
|
print(e)
|
|
|
|
print("Create security group...")
|
|
print("------------------------------------")
|
|
|
|
try:
|
|
response = ec2Client.create_security_group(GroupName='tug-of-war-asg',
|
|
Description='tug-of-war-asg',
|
|
VpcId=vpc_id)
|
|
security_group_id = response['GroupId']
|
|
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
|
|
|
|
data = ec2Client.authorize_security_group_ingress(
|
|
GroupId=security_group_id,
|
|
IpPermissions=[
|
|
{'IpProtocol': 'tcp',
|
|
'FromPort': 3306,
|
|
'ToPort': 3306,
|
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
{'IpProtocol': 'tcp',
|
|
'FromPort': 22,
|
|
'ToPort': 22,
|
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
{'IpProtocol': 'tcp',
|
|
'FromPort': 80,
|
|
'ToPort': 80,
|
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
|
|
{'IpProtocol': 'tcp',
|
|
'FromPort': 443,
|
|
'ToPort': 443,
|
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}
|
|
])
|
|
print('Ingress Successfully Set %s' % data)
|
|
except ClientError as e:
|
|
print(e)
|
|
|
|
print("Running new DB instance...")
|
|
print("------------------------------------")
|
|
|
|
response = ec2Client.run_instances(
|
|
ImageId=imageId,
|
|
InstanceType=instanceType,
|
|
Placement={'AvailabilityZone': availabilityZone, },
|
|
KeyName=keyName,
|
|
MinCount=1,
|
|
MaxCount=1,
|
|
UserData=userDataDB,
|
|
SecurityGroupIds=[
|
|
security_group_id,
|
|
],
|
|
TagSpecifications=[
|
|
{
|
|
'ResourceType': 'instance',
|
|
'Tags': [
|
|
{'Key': 'Name', 'Value': 'tug-of-war-asg-db1'},
|
|
{'Key': 'tug-of-war-asg', 'Value': 'db'}
|
|
],
|
|
}
|
|
],
|
|
)
|
|
|
|
instanceIdDB = response['Instances'][0]['InstanceId']
|
|
privateIpDB = response['Instances'][0]['PrivateIpAddress']
|
|
# privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
|
|
|
|
instance = ec2Resource.Instance(instanceIdDB)
|
|
instance.wait_until_running()
|
|
|
|
print(instanceIdDB)
|
|
|
|
userDataWebServer = ('#!/bin/bash\n'
|
|
'# extra repo for RedHat rpms\n'
|
|
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
|
|
'# essential tools\n'
|
|
'yum install -y joe htop git\n'
|
|
'# mysql\n'
|
|
'yum install -y httpd php php-mysql\n'
|
|
'\n'
|
|
'service httpd start\n'
|
|
'service httpd start\n'
|
|
'\n'
|
|
# 'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n'
|
|
# 'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n'
|
|
# 'tar zxvf tug-of-war-in-the-clouds.tar.gz\n'
|
|
'cd /var/www/html\n'
|
|
'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/index.php\n'
|
|
'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/cloud.php\n'
|
|
'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/config.php\n'
|
|
'\n'
|
|
'# change hostname of db connection\n'
|
|
'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n'
|
|
)
|
|
|
|
print("Creating launch configuration...")
|
|
print("------------------------------------")
|
|
|
|
response = asClient.create_launch_configuration(
|
|
#IamInstanceProfile='my-iam-role',
|
|
ImageId=imageId,
|
|
InstanceType=instanceType,
|
|
LaunchConfigurationName='tug-of-war-asg-launchconfig',
|
|
UserData=userDataWebServer,
|
|
KeyName=keyName,
|
|
SecurityGroups=[
|
|
security_group_id,
|
|
],
|
|
)
|
|
|
|
elbv2Client = boto3.client('elbv2')
|
|
|
|
print("Creating load balancer...")
|
|
print("------------------------------------")
|
|
|
|
response = elbv2Client.create_load_balancer(
|
|
Name='tug-of-war-asg-loadbalancer',
|
|
Subnets=[
|
|
subnet1,
|
|
subnet2,
|
|
subnet3,
|
|
],
|
|
SecurityGroups=[
|
|
security_group_id
|
|
]
|
|
)
|
|
|
|
loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '')
|
|
loadbalancer_dns = response.get('LoadBalancers', [{}])[0].get('DNSName', '')
|
|
|
|
print("Creating target group...")
|
|
print("------------------------------------")
|
|
|
|
response = elbv2Client.create_target_group(
|
|
Name='tug-of-war-asg-targetgroup',
|
|
Port=80,
|
|
Protocol='HTTP',
|
|
VpcId=vpc_id,
|
|
)
|
|
|
|
targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '')
|
|
|
|
print("Creating listener...")
|
|
print("------------------------------------")
|
|
|
|
response = elbv2Client.create_listener(
|
|
DefaultActions=[
|
|
{
|
|
'TargetGroupArn': targetgroup_arn,
|
|
'Type': 'forward',
|
|
},
|
|
],
|
|
LoadBalancerArn=loadbalancer_arn,
|
|
Port=80,
|
|
Protocol='HTTP',
|
|
)
|
|
|
|
response = elbv2Client.modify_target_group_attributes(
|
|
TargetGroupArn=targetgroup_arn,
|
|
Attributes=[
|
|
{
|
|
'Key': 'stickiness.enabled',
|
|
'Value': 'true'
|
|
},
|
|
]
|
|
)
|
|
|
|
print("Creating auto scaling group...")
|
|
print("------------------------------------")
|
|
|
|
response = asClient.create_auto_scaling_group(
|
|
AutoScalingGroupName='tug-of-war-asg-autoscalinggroup',
|
|
LaunchConfigurationName='tug-of-war-asg-launchconfig',
|
|
MaxSize=3,
|
|
MinSize=1,
|
|
HealthCheckGracePeriod=120,
|
|
HealthCheckType='ELB',
|
|
TargetGroupARNs=[
|
|
targetgroup_arn,
|
|
],
|
|
VPCZoneIdentifier=subnet1 + ', ' + ', ' + subnet2 + ', ' + subnet3,
|
|
Tags=[
|
|
{'Key': 'Name', 'Value': 'tug-of-war-asg-webserver', 'PropagateAtLaunch': True},
|
|
{'Key': 'tug-of-war', 'Value': 'webserver', 'PropagateAtLaunch': True}
|
|
],
|
|
)
|
|
|
|
print(loadbalancer_arn)
|
|
print(targetgroup_arn)
|
|
print('app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[3]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[2])
|
|
|
|
response = asClient.put_scaling_policy(
|
|
AutoScalingGroupName='tug-of-war-asg-autoscalinggroup',
|
|
PolicyName='tug-of-war-asg-scalingpolicy',
|
|
PolicyType='TargetTrackingScaling',
|
|
EstimatedInstanceWarmup=30,
|
|
TargetTrackingConfiguration={
|
|
'PredefinedMetricSpecification': {
|
|
'PredefinedMetricType': 'ALBRequestCountPerTarget',
|
|
'ResourceLabel': 'app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[3]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[2]
|
|
},
|
|
'TargetValue': 5.0,
|
|
}
|
|
)
|