|
|
import time
import boto3 from botocore.exceptions import ClientError
################################################################################################ # # Configuration Parameters # ################################################################################################
print("!!!!!!!! You cannot use Auto Scaling Group in AWS Educate Account !!!!!!!!") exit(-1)
# place your credentials in ~/.aws/credentials, as mentioned in AWS Educate Classroom, # Account Details, AWC CLI -> Show (Copy and paste the following into ~/.aws/credentials)
# changed to use us-east, to be able to use AWS Educate Classroom region = 'us-east-1' availabilityZone1 = 'us-east-1a' availabilityZone2 = 'us-east-1b' availabilityZone3 = 'us-east-1c' # region = 'eu-central-1' # availabilityZone = 'eu-central-1b'
# AMI ID of Amazon Linux 2 image 64-bit x86 in us-east-1 (can be retrieved, e.g., at # https://console.aws.amazon.com/ec2/v2/home?region=us-east-1#LaunchInstanceWizard:) imageId = 'ami-0d5eff06f840b45e9' # for eu-central-1, AMI ID of Amazon Linux 2 would be: # imageId = 'ami-0cc293023f983ed53'
# potentially change instanceType to t2.micro for "free tier" if using a regular account # for production, t3.nano seams better instanceType = 't2.nano'
keyName = 'srieger-pub'
################################################################################################ # # boto3 code # ################################################################################################
client = boto3.setup_default_session(region_name=region) ec2Client = boto3.client("ec2") ec2Resource = boto3.resource('ec2')
elbv2Client = boto3.client('elbv2') asClient = boto3.client('autoscaling')
# if you only have one VPC, vpc_id can be retrieved using: response = ec2Client.describe_vpcs() vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') # if you have more than one VPC, vpc_id should be specified, and code # top retrieve VPC id below needs to be commented out # vpc_id = 'vpc-eedd4187'
subnet_id1 = ec2Client.describe_subnets( Filters=[ { 'Name': 'availability-zone', 'Values': [availabilityZone1] } ])['Subnets'][0]['SubnetId']
subnet_id2 = ec2Client.describe_subnets( Filters=[ { 'Name': 'availability-zone', 'Values': [availabilityZone2] } ])['Subnets'][0]['SubnetId']
subnet_id3 = ec2Client.describe_subnets( Filters=[ { 'Name': 'availability-zone', 'Values': [availabilityZone3] } ])['Subnets'][0]['SubnetId']
print("Deleting auto scaling group...") print("------------------------------------")
try: response = asClient.delete_auto_scaling_group(AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', ForceDelete=True) except ClientError as e: print(e)
print("Deleting launch configuration...") print("------------------------------------")
try: response = asClient.delete_launch_configuration(LaunchConfigurationName='tug-of-war-asg-launchconfig') except ClientError as e: print(e)
print("Deleting old instances...") print("------------------------------------")
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war-asg']}]) print(response) reservations = response['Reservations'] for reservation in reservations: for instance in reservation['Instances']: if instance['State']['Name'] == "running": response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']]) print(response) instanceToTerminate = ec2Resource.Instance(instance['InstanceId']) instanceToTerminate.wait_until_terminated()
print("Deleting load balancer and deps...") print("------------------------------------")
try: response = elbv2Client.describe_load_balancers(Names=['tug-of-war-asg-loadbalancer']) loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '') response = elbv2Client.delete_load_balancer(LoadBalancerArn=loadbalancer_arn)
waiter = elbv2Client.get_waiter('load_balancers_deleted') waiter.wait(LoadBalancerArns=[loadbalancer_arn]) except ClientError as e: print(e)
try: response = elbv2Client.describe_target_groups(Names=['tug-of-war-asg-targetgroup']) while len(response.get('TargetGroups', [{}])) > 0: targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '') try: response = elbv2Client.delete_target_group(TargetGroupArn=targetgroup_arn) except ClientError as e: print(e) response = elbv2Client.describe_target_groups(Names=['tug-of-war-asg-targetgroup']) time.sleep(5) except ClientError as e: print(e)
print("Delete old security group...") print("------------------------------------")
try: response = ec2Client.describe_security_groups(Filters=[{'Name': 'group-name', 'Values': ['tug-of-war-asg']}]) while len(response.get('SecurityGroups', [{}])) > 0: security_group_id = response.get('SecurityGroups', [{}])[0].get('GroupId', '') try: response = ec2Client.delete_security_group(GroupName='tug-of-war-asg') except ClientError as e: print(e) response = ec2Client.describe_security_groups(Filters=[{'Name': 'group-name', 'Values': ['tug-of-war-asg']}]) time.sleep(5) except ClientError as e: print(e)
print("Create security group...") print("------------------------------------")
try: response = ec2Client.create_security_group(GroupName='tug-of-war-asg', Description='tug-of-war-asg', VpcId=vpc_id) security_group_id = response['GroupId'] print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
data = ec2Client.authorize_security_group_ingress( GroupId=security_group_id, IpPermissions=[ {'IpProtocol': 'tcp', 'FromPort': 3306, 'ToPort': 3306, 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, {'IpProtocol': 'tcp', 'FromPort': 22, 'ToPort': 22, 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, {'IpProtocol': 'tcp', 'FromPort': 80, 'ToPort': 80, 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, {'IpProtocol': 'tcp', 'FromPort': 443, 'ToPort': 443, 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]} ]) print('Ingress Successfully Set %s' % data) except ClientError as e: print(e)
print("Running new DB instance...") print("------------------------------------")
userDataDB = ('#!/bin/bash\n' '# extra repo for RedHat rpms\n' 'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' '# essential tools\n' 'yum install -y joe htop git\n' '# mysql\n' 'yum install -y mariadb mariadb-server\n' '\n' 'service mariadb start\n' '\n' 'echo "create database cloud_tug_of_war" | mysql -u root\n' '\n' 'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n' '\n' 'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloudpass\';" | mysql -u root\n' 'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n' 'echo "FLUSH PRIVILEGES" | mysql -u root\n' ) # convert user-data from script with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/"
response = ec2Client.run_instances( ImageId=imageId, InstanceType=instanceType, Placement={'AvailabilityZone': availabilityZone1, }, KeyName=keyName, MinCount=1, MaxCount=1, UserData=userDataDB, SecurityGroupIds=[ security_group_id, ], TagSpecifications=[ { 'ResourceType': 'instance', 'Tags': [ {'Key': 'Name', 'Value': 'tug-of-war-asg-db1'}, {'Key': 'tug-of-war-asg', 'Value': 'db'} ], } ], )
instanceIdDB = response['Instances'][0]['InstanceId'] privateIpDB = response['Instances'][0]['PrivateIpAddress'] # privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
instance = ec2Resource.Instance(instanceIdDB) instance.wait_until_running()
print(instanceIdDB)
userDataWebServer = ('#!/bin/bash\n' '# extra repo for RedHat rpms\n' 'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' '# essential tools\n' 'yum install -y joe htop git\n' '# mysql\n' 'yum install -y httpd php php-mysql\n' '\n' 'service httpd start\n' '\n' # 'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n' # 'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n' # 'tar zxvf tug-of-war-in-the-clouds.tar.gz\n' 'cd /var/www/html\n' 'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/index.php\n' 'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/cloud.php\n' 'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/config.php\n' '\n' '# change hostname of db connection\n' 'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n' )
print("Creating launch configuration...") print("------------------------------------")
response = asClient.create_launch_configuration( #IamInstanceProfile='my-iam-role', ImageId=imageId, InstanceType=instanceType, LaunchConfigurationName='tug-of-war-asg-launchconfig', UserData=userDataWebServer, KeyName=keyName, SecurityGroups=[ security_group_id, ], )
elbv2Client = boto3.client('elbv2')
print("Creating load balancer...") print("------------------------------------")
response = elbv2Client.create_load_balancer( Name='tug-of-war-asg-loadbalancer', Subnets=[ subnet_id1, subnet_id2, subnet_id3, ], SecurityGroups=[ security_group_id ] )
loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '') loadbalancer_dns = response.get('LoadBalancers', [{}])[0].get('DNSName', '')
print("Creating target group...") print("------------------------------------")
response = elbv2Client.create_target_group( Name='tug-of-war-asg-targetgroup', Port=80, Protocol='HTTP', VpcId=vpc_id, )
targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '')
print("Creating listener...") print("------------------------------------")
response = elbv2Client.create_listener( DefaultActions=[ { 'TargetGroupArn': targetgroup_arn, 'Type': 'forward', }, ], LoadBalancerArn=loadbalancer_arn, Port=80, Protocol='HTTP', )
response = elbv2Client.modify_target_group_attributes( TargetGroupArn=targetgroup_arn, Attributes=[ { 'Key': 'stickiness.enabled', 'Value': 'true' }, ] )
print("Creating auto scaling group...") print("------------------------------------")
response = asClient.create_auto_scaling_group( AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', LaunchConfigurationName='tug-of-war-asg-launchconfig', MaxSize=3, MinSize=1, HealthCheckGracePeriod=120, HealthCheckType='ELB', TargetGroupARNs=[ targetgroup_arn, ], VPCZoneIdentifier=subnet_id1 + ', ' + ', ' + subnet_id2 + ', ' + subnet_id3, Tags=[ {'Key': 'Name', 'Value': 'tug-of-war-asg-webserver', 'PropagateAtLaunch': True}, {'Key': 'tug-of-war', 'Value': 'webserver', 'PropagateAtLaunch': True} ], )
print(loadbalancer_arn) print(targetgroup_arn) print('app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[3]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[2])
response = asClient.put_scaling_policy( AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', PolicyName='tug-of-war-asg-scalingpolicy', PolicyType='TargetTrackingScaling', EstimatedInstanceWarmup=30, TargetTrackingConfiguration={ 'PredefinedMetricSpecification': { 'PredefinedMetricType': 'ALBRequestCountPerTarget', 'ResourceLabel': 'app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[3]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[2] }, 'TargetValue': 5.0, } )
print('Load Balancer should be reachable at: ' + loadbalancer_dns)
|