From 4c2da97e78a88ae87ea0129db4edac0ea08c16c3 Mon Sep 17 00:00:00 2001 From: Sebastian Rieger Date: Tue, 2 Jul 2019 13:38:51 +0200 Subject: [PATCH] added example-projects --- aws-turnserver/start.py | 241 ---- ...oudcomp-counter-demo-with-vpc-designer.png | Bin .../cloudcomp-counter-demo-with-vpc.json | 1090 ++++++++--------- .../cloudcomp-counter-demo.json | 786 ++++++------ .../tug-of-war-in-the-clouds/start.py | 184 +++ .../tug-of-war-in-the-clouds}/stop.py | 16 +- 6 files changed, 1124 insertions(+), 1193 deletions(-) delete mode 100644 aws-turnserver/start.py rename {aws-cloudformation-demo => example-projects/counter-demo/aws-cloudformation-demo}/cloudcomp-counter-demo-with-vpc-designer.png (100%) rename {aws-cloudformation-demo => example-projects/counter-demo/aws-cloudformation-demo}/cloudcomp-counter-demo-with-vpc.json (96%) rename {aws-cloudformation-demo => example-projects/counter-demo/aws-cloudformation-demo}/cloudcomp-counter-demo.json (96%) create mode 100644 example-projects/tug-of-war-in-the-clouds/start.py rename {aws-turnserver => example-projects/tug-of-war-in-the-clouds}/stop.py (69%) diff --git a/aws-turnserver/start.py b/aws-turnserver/start.py deleted file mode 100644 index 151abce..0000000 --- a/aws-turnserver/start.py +++ /dev/null @@ -1,241 +0,0 @@ -import boto3 -from botocore.exceptions import ClientError - -region = 'eu-central-1' -availabilityZone = 'eu-central-1b' -imageId = 'ami-0cc293023f983ed53' -instanceType = 't3.nano' -keyName = 'srieger-pub' -userData = ('#!/bin/bash\n' - 'COTURN_VERSION="4.5.1.1"\n' - 'LIBEVENT_VERSION="2.0.21"\n' - '\n' - '# extra repo for RedHat rpms\n' - 'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' - '# essential tools\n' - 'yum install -y joe htop git\n' - '# coturn requirements\n' - 'yum install -y gcc openssl-devel\n' - 'yum install -y sqlite-devel mysql-devel hiredis-devel mongo-c-driver-devel\n' - '\n' - '### libevent installation ###\n' - 'wget https://github.com/downloads/libevent/libevent/libevent-$LIBEVENT_VERSION-stable.tar.gz\n' - '\n' - 'tar xvfz libevent-$LIBEVENT_VERSION-stable.tar.gz\n' - 'cd libevent-$LIBEVENT_VERSION-stable\n' - './configure\n' - 'make\n' - 'make install\n' - '\n' - '### turnserver installation ###\n' - 'wget https://coturn.net/turnserver/v$COTURN_VERSION/turnserver-$COTURN_VERSION.tar.gz\n' - 'tar xvfz turnserver-$COTURN_VERSION.tar.gz\n' - 'cd turnserver-$COTURN_VERSION\n' - './configure\n' - 'make\n' - 'make install\n' - '\n' - 'openssl req -new -subj "/CN=coturn" -newkey rsa:4096 -x509 -sha256 -days 365 -nodes -out /usr/local/etc/turn_server_cert.pem -keyout /usr/local/etc/turn_server_pkey.pem\n' - '\n' - '/usr/local/bin/turnadmin -a -u srieger -r hs-fulda.de -p coturnserver2019\n' - '/usr/local/bin/turnadmin -A -u srieger -p coturnserver2019\n' - '\n' - 'MAC_ETH0=$(cat /sys/class/net/eth0/address)\n' - 'MAC_ETH1=$(cat /sys/class/net/eth1/address)\n' - 'LOCAL_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/local-ipv4s)\n' - 'LOCAL_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/local-ipv4s)\n' - 'PUBLIC_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/public-ipv4s)\n' - 'PUBLIC_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/public-ipv4s)\n' - '\n' - 'cat < /usr/local/etc/turnserver.conf\n' - 'verbose\n' - 'listening-ip=$LOCAL_IPV4S_ETH0\n' - 'listening-ip=$LOCAL_IPV4S_ETH1\n' - 'relay-ip=$LOCAL_IPV4S_ETH0\n' - 'relay-ip=$LOCAL_IPV4S_ETH1\n' - 'external-ip=$PUBLIC_IPV4S_ETH0/$LOCAL_IPV4S_ETH0\n' - 'external-ip=$PUBLIC_IPV4S_ETH1/$LOCAL_IPV4S_ETH1\n' - 'fingerprint\n' - 'lt-cred-mech\n' - '#use-auth-secret\n' - '#static-auth-secret=751c45cae60a2839711a94c8d6bf0089e78b2149ca602fdXXXXXXXXXXXXXXXXX\n' - 'realm=hs-fulda.de\n' - 'total-quota=100\n' - 'stale-nonce\n' - 'cipher-list="ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AES:RSA+3DES:!ADH:!AECDH:!MD5"\n' - '#no-stun\n' - '#no-loopback-peers\n' - '#no-multicast-peers\n' - 'cli-password=coturnserver2019\n' - 'web-admin\n' - 'web-admin-ip=$LOCAL_IPV4S_ETH0\n' - 'EOF\n' - '\n' - '/usr/local/bin/turnserver\n' - ) - -# convert with: cat install-coturn | sed "s/^/'/; s/$/\\\n'/" - -client = boto3.setup_default_session(region_name=region) -ec2Client = boto3.client("ec2") -ec2Resource = boto3.resource('ec2') - -response = ec2Client.describe_vpcs() -vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') -subnet_id = ec2Client.describe_subnets( - Filters=[ - { - 'Name': 'availability-zone', 'Values': [availabilityZone] - } - ])['Subnets'][0]['SubnetId'] - -print("Deleting old instance...") -print("------------------------------------") - -response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}]) -print(response) -reservations = response['Reservations'] -for reservation in reservations: - for instance in reservation['Instances']: - if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending": - response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']]) - print(response) - instanceToTerminate = ec2Resource.Instance(instance['InstanceId']) - instanceToTerminate.wait_until_terminated() - -print("Delete old security group...") -print("------------------------------------") - -try: - response = ec2Client.delete_security_group(GroupName='coturn') -except ClientError as e: - print(e) - -print("Delete old elastic ips...") -print("------------------------------------") - -try: - response = ec2Client.describe_addresses(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}]) - addresses = response['Addresses'] - for address in addresses: - ec2Client.release_address(AllocationId=address['AllocationId']) -except ClientError as e: - print(e) - -print("Create security group...") -print("------------------------------------") - -try: - response = ec2Client.create_security_group(GroupName='coturn', - Description='coturn', - VpcId=vpc_id) - security_group_id = response['GroupId'] - print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id)) - - data = ec2Client.authorize_security_group_ingress( - GroupId=security_group_id, - IpPermissions=[ - {'IpProtocol': 'tcp', - 'FromPort': 3478, - 'ToPort': 3478, - 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, - {'IpProtocol': 'udp', - 'FromPort': 3478, - 'ToPort': 3478, - 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, - {'IpProtocol': 'tcp', - 'FromPort': 5349, - 'ToPort': 5349, - 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, - {'IpProtocol': 'udp', - 'FromPort': 5349, - 'ToPort': 5349, - 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, - {'IpProtocol': 'tcp', - 'FromPort': 8080, - 'ToPort': 8080, - 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, - {'IpProtocol': 'udp', - 'FromPort': 49152, - 'ToPort': 65535, - 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, - {'IpProtocol': 'tcp', - 'FromPort': 22, - 'ToPort': 22, - 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]} - ]) - print('Ingress Successfully Set %s' % data) -except ClientError as e: - print(e) - -print("Allocate additional elastic ips...") -print("------------------------------------") - -response = ec2Client.allocate_address( - Domain='vpc', -) -firstIpAddressAllocationId = response['AllocationId'] -ec2Client.create_tags(Resources=[firstIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}]) - -response = ec2Client.allocate_address( - Domain='vpc', -) -secondIpAddressAllocationId = response['AllocationId'] -ec2Client.create_tags(Resources=[secondIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}]) - -print("Running new instance...") -print("------------------------------------") - -response = ec2Client.run_instances( - ImageId=imageId, - InstanceType=instanceType, - Placement={'AvailabilityZone': availabilityZone, }, - KeyName=keyName, - MinCount=1, - MaxCount=1, - UserData=userData, - NetworkInterfaces=[ - { - 'DeviceIndex': 0, - 'Groups': [ - security_group_id, - ], - 'SubnetId': subnet_id, - }, - { - 'DeviceIndex': 1, - 'Groups': [ - security_group_id, - ], - 'SubnetId': subnet_id, - }, - ], - TagSpecifications=[ - { - 'ResourceType': 'instance', - 'Tags': [ - {'Key': 'coturn', 'Value': 'installed'} - ], - } - ], -) - -instanceId = response['Instances'][0]['InstanceId'] -firstNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] -secondNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][1]['NetworkInterfaceId'] - -instance = ec2Resource.Instance(instanceId) -instance.wait_until_running() - -response = ec2Client.associate_address( - AllocationId=firstIpAddressAllocationId, - NetworkInterfaceId=firstNetworkInterfaceId, -) -response = ec2Client.associate_address( - AllocationId=secondIpAddressAllocationId, - NetworkInterfaceId=secondNetworkInterfaceId, -) - - -print(instanceId) - diff --git a/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png b/example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png similarity index 100% rename from aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png rename to example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png diff --git a/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json b/example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json similarity index 96% rename from aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json rename to example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json index adc4602..e6cf647 100644 --- a/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json +++ b/example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json @@ -1,546 +1,546 @@ -{ - "AWSTemplateFormatVersion": "2010-09-09", - "Parameters": { - "paramImageID": { - "Type": "AWS::EC2::Image::Id", - "Default": "ami-f573e19a", - "Description": "Amazon Image ID (Amazon Linux), Frankfurt ami-f573e19a, N. Virginia ami-4dd18837" - }, - "paramInstanceType": { - "Type": "String", - "Default": "t2.nano", - "AllowedValues": [ - "t2.nano", - "t2.micro", - "m1.small" - ], - "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." - }, - "paramKeyPair": { - "Type": "AWS::EC2::KeyPair::KeyName", - "Description": "Amazon EC2 Key Pair" - }, - "paramIamInstanceRole": { - "Type": "String", - "Default": "ec2-s3-vertsys-access-role", - "Description": "IAM Instance Role" - } - }, - "Resources": { - "lcVertSysAutoScaleConfigv11": { - "Type": "AWS::AutoScaling::LaunchConfiguration", - "Properties": { - "AssociatePublicIpAddress": true, - "ImageId": { - "Ref": "paramImageID" - }, - "InstanceType": { - "Ref": "paramInstanceType" - }, - "KeyName": { - "Ref": "paramKeyPair" - }, - "IamInstanceProfile": { - "Ref": "paramIamInstanceRole" - }, - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "UserData": { - "Fn::Base64": { - "Fn::Join": [ - "", - [ - "#!/bin/bash\n", - "\n", - "# this script will be run during the boot process by each VertSys instance created\n", - "# in AWS currently this is a plain bash script that requires a RedHat based image\n", - "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", - "# distros\n", - "#\n", - "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", - "\n", - "# Config\n", - "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", - "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", - "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", - "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", - "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", - "\n", - "# Create path to run the script\n", - "mkdir $SCRIPT_ROOT_PATH\n", - "cd $SCRIPT_ROOT_PATH\n", - "\n", - "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", - "wget http://169.254.169.254/latest/user-data\n", - "chmod +x user-data\n", - "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", - "\n", - "# setting console prompt to include location (availability zone and region in AWS)\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", - "\n", - "# wait for internet connection, should not be necessary, but just in case ;)\n", - "while ! ping -c 1 -W 1 8.8.8.8; do\n", - " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", - " sleep 1\n", - "done\n", - "\n", - "# installation of required packages\n", - "echo \"Installing packages...\"\n", - "sudo yum update -y\n", - "sudo yum install -y java git\n", - "#rm -rf verteilte-systeme-bsc-ai-examples\n", - "if [ ! -d $VERTSYS_PATH ]; then\n", - " echo \"Cloning repo...\"\n", - " git clone $REPO\n", - "fi\n", - "\n", - "# killall running screens, .e.g to cleanup if script is run again after boot\n", - "killall screen\n", - "# start all jars\n", - "echo \"Starting JARS: ${JARS}...\"\n", - "for JAR in $JARS; do\n", - " echo \"Starting ${JAR}...\"\n", - " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", - "done\n", - "\n", - "# wait a second, to allow java services to start\n", - "sleep 1\n", - "\n", - "# output status of ports 36000-36199 and all running processes\n", - "echo \"Status:\"\n", - "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", - "sudo ps aux | grep java\n", - "\n", - "# Example for path and contents:\n", - "#\n", - "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", - "#\n", - "#build-server-jars.xml TCPServerMulti.jar\n", - "#RMIEchoServer.jar UDPServer.jar\n", - "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", - "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", - "#TCPServer.jar\n" - ] - ] - } - } - } - }, - "vpcCloudCompCounterDemo": { - "Type": "AWS::EC2::VPC", - "Properties": { - "CidrBlock": "10.0.0.0/16", - "EnableDnsSupport": "true", - "EnableDnsHostnames": "true", - "Tags": [ - { - "Key": "Name", - "Value": "vpcCloudCompCounterDemo" - } - ] - } - }, - "subnetCloudCompCounterDemoPublicSubnetAz1": { - "Type": "AWS::EC2::Subnet", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "CidrBlock": "10.0.0.0/24", - "AvailabilityZone": { - "Fn::Select": [ - "0", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - }, - "Tags": [ - { - "Key": "Name", - "Value": "subnetCloudCompCounterDemoPublicSubnetAz1" - } - ] - } - }, - "subnetCloudCompCounterDemoPublicSubnetAz2": { - "Type": "AWS::EC2::Subnet", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "CidrBlock": "10.0.1.0/24", - "AvailabilityZone": { - "Fn::Select": [ - "1", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - }, - "Tags": [ - { - "Key": "Name", - "Value": "subnetCloudCompCounterDemoPublicSubnetAz2" - } - ] - } - }, - "igCloudCompCounterDemo": { - "Type": "AWS::EC2::InternetGateway", - "Properties": { - "Tags": [ - { - "Key": "Name", - "Value": "igCloudCompCounterDemo" - } - ] - } - }, - "attachGateway": { - "Type": "AWS::EC2::VPCGatewayAttachment", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "InternetGatewayId": { - "Ref": "igCloudCompCounterDemo" - } - } - }, - "routetableViaIgw": { - "Type": "AWS::EC2::RouteTable", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "Tags": [ - { - "Key": "Name", - "Value": "routetableViaIgw" - } - ] - } - }, - "publicrouteViaIgw": { - "Type": "AWS::EC2::Route", - "DependsOn": "attachGateway", - "Properties": { - "RouteTableId": { - "Ref": "routetableViaIgw" - }, - "DestinationCidrBlock": "0.0.0.0/0", - "GatewayId": { - "Ref": "igCloudCompCounterDemo" - } - } - }, - "publicsubnet1RouteTableAssociation": { - "Type": "AWS::EC2::SubnetRouteTableAssociation", - "Properties": { - "SubnetId": { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" - }, - "RouteTableId": { - "Ref": "routetableViaIgw" - } - } - }, - "publicsubnet2RouteTableAssociation": { - "Type": "AWS::EC2::SubnetRouteTableAssociation", - "Properties": { - "SubnetId": { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" - }, - "RouteTableId": { - "Ref": "routetableViaIgw" - } - } - }, - "sgCloudCompDemoSecurityGroup": { - "Type": "AWS::EC2::SecurityGroup", - "Properties": { - "GroupDescription": "CloudComp Counter Demo", - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - } - } - }, - "ingress1": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress2": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "22", - "ToPort": "22", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress3": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "udp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "egress1": { - "Type": "AWS::EC2::SecurityGroupEgress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "-1", - "CidrIp": "0.0.0.0/0" - } - }, - "asgCloudCompAutoScaleGroup": { - "Type": "AWS::AutoScaling::AutoScalingGroup", - "Properties": { - "AvailabilityZones": [ - { - "Fn::Select": [ - "0", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - }, - { - "Fn::Select": [ - "1", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - } - ], - "TargetGroupARNs": [ - { - "Ref": "elbCloudCompTargetGroup" - } - ], - "Cooldown": "30", - "DesiredCapacity": "1", - "HealthCheckGracePeriod": "60", - "HealthCheckType": "EC2", - "MaxSize": "3", - "MinSize": "1", - "VPCZoneIdentifier": [ - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" - }, - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" - } - ], - "LaunchConfigurationName": { - "Ref": "lcVertSysAutoScaleConfigv11" - }, - "MetricsCollection": [ - { - "Granularity": "1Minute", - "Metrics": [ - "GroupPendingInstances", - "GroupMinSize", - "GroupDesiredCapacity", - "GroupTerminatingInstances", - "GroupInServiceInstances", - "GroupStandbyInstances", - "GroupMaxSize", - "GroupTotalInstances" - ] - } - ], - "TerminationPolicies": [ - "Default" - ] - } - }, - "sgCloudCompScalePolicy": { - "Type": "AWS::AutoScaling::ScalingPolicy", - "DependsOn": "elbCloudCompListener", - "Properties": { - "PolicyType": "TargetTrackingScaling", - "EstimatedInstanceWarmup": 60, - "TargetTrackingConfiguration": { - "DisableScaleIn": false, - "TargetValue": 5, - "PredefinedMetricSpecification": { - "PredefinedMetricType": "ALBRequestCountPerTarget", - "ResourceLabel": { - "Fn::Join": [ - "/", - [ - "app/elbCloudCompLoadBalancer", - { - "Fn::Select": [ - "3", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompLoadBalancer" - } - ] - } - ] - }, - "targetgroup/elbCloudCompTargetGroup", - { - "Fn::Select": [ - "2", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompTargetGroup" - } - ] - } - ] - } - ] - ] - } - } - }, - "AutoScalingGroupName": { - "Ref": "asgCloudCompAutoScaleGroup" - } - } - }, - "elbCloudCompLoadBalancer": { - "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", - "Properties": { - "Name": "elbCloudCompLoadBalancer", - "IpAddressType": "ipv4", - "Type": "application", - "Scheme": "internet-facing", - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "Subnets": [ - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" - }, - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" - } - ] - } - }, - "elbCloudCompTargetGroup": { - "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", - "Properties": { - "Port": 36042, - "HealthCheckIntervalSeconds": 30, - "HealthCheckTimeoutSeconds": 5, - "HealthyThresholdCount": 2, - "UnhealthyThresholdCount": 2, - "HealthCheckPath": "/counter", - "HealthCheckProtocol": "HTTP", - "TargetGroupAttributes": [ - { - "Key": "deregistration_delay.timeout_seconds", - "Value": "20" - } - ], - "Protocol": "HTTP", - "TargetType": "instance", - "Matcher": { - "HttpCode": "200" - }, - "Name": "elbCloudCompTargetGroup", - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - } - } - }, - "elbCloudCompListener": { - "Type": "AWS::ElasticLoadBalancingV2::Listener", - "Properties": { - "LoadBalancerArn": { - "Ref": "elbCloudCompLoadBalancer" - }, - "Protocol": "HTTP", - "Port": 36042, - "DefaultActions": [ - { - "Type": "forward", - "TargetGroupArn": { - "Ref": "elbCloudCompTargetGroup" - } - } - ] - } - } - }, - "Outputs": { - "LoadBalancer": { - "Description": "Load Balancer", - "Value": { - "Ref": "elbCloudCompLoadBalancer" - } - }, - "LoadBalancerDns": { - "Description": "Load Balancer DNS", - "Value": { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - } - }, - "LoadBalancerURL": { - "Description": "Load Balancer URL", - "Value": { - "Fn::Join": [ - ":", - [ - { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - }, - "36042/counter" - ] - ] - } - } - }, - "Description": "CloudComp Counter Demo" +{ + "AWSTemplateFormatVersion": "2010-09-09", + "Parameters": { + "paramImageID": { + "Type": "AWS::EC2::Image::Id", + "Default": "ami-f573e19a", + "Description": "Amazon Image ID (Amazon Linux), Frankfurt ami-f573e19a, N. Virginia ami-4dd18837" + }, + "paramInstanceType": { + "Type": "String", + "Default": "t2.nano", + "AllowedValues": [ + "t2.nano", + "t2.micro", + "m1.small" + ], + "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." + }, + "paramKeyPair": { + "Type": "AWS::EC2::KeyPair::KeyName", + "Description": "Amazon EC2 Key Pair" + }, + "paramIamInstanceRole": { + "Type": "String", + "Default": "ec2-s3-vertsys-access-role", + "Description": "IAM Instance Role" + } + }, + "Resources": { + "lcVertSysAutoScaleConfigv11": { + "Type": "AWS::AutoScaling::LaunchConfiguration", + "Properties": { + "AssociatePublicIpAddress": true, + "ImageId": { + "Ref": "paramImageID" + }, + "InstanceType": { + "Ref": "paramInstanceType" + }, + "KeyName": { + "Ref": "paramKeyPair" + }, + "IamInstanceProfile": { + "Ref": "paramIamInstanceRole" + }, + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "UserData": { + "Fn::Base64": { + "Fn::Join": [ + "", + [ + "#!/bin/bash\n", + "\n", + "# this script will be run during the boot process by each VertSys instance created\n", + "# in AWS currently this is a plain bash script that requires a RedHat based image\n", + "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", + "# distros\n", + "#\n", + "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", + "\n", + "# Config\n", + "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", + "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", + "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", + "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", + "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", + "\n", + "# Create path to run the script\n", + "mkdir $SCRIPT_ROOT_PATH\n", + "cd $SCRIPT_ROOT_PATH\n", + "\n", + "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", + "wget http://169.254.169.254/latest/user-data\n", + "chmod +x user-data\n", + "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", + "\n", + "# setting console prompt to include location (availability zone and region in AWS)\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", + "\n", + "# wait for internet connection, should not be necessary, but just in case ;)\n", + "while ! ping -c 1 -W 1 8.8.8.8; do\n", + " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", + " sleep 1\n", + "done\n", + "\n", + "# installation of required packages\n", + "echo \"Installing packages...\"\n", + "sudo yum update -y\n", + "sudo yum install -y java git\n", + "#rm -rf verteilte-systeme-bsc-ai-examples\n", + "if [ ! -d $VERTSYS_PATH ]; then\n", + " echo \"Cloning repo...\"\n", + " git clone $REPO\n", + "fi\n", + "\n", + "# killall running screens, .e.g to cleanup if script is run again after boot\n", + "killall screen\n", + "# start all jars\n", + "echo \"Starting JARS: ${JARS}...\"\n", + "for JAR in $JARS; do\n", + " echo \"Starting ${JAR}...\"\n", + " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", + "done\n", + "\n", + "# wait a second, to allow java services to start\n", + "sleep 1\n", + "\n", + "# output status of ports 36000-36199 and all running processes\n", + "echo \"Status:\"\n", + "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", + "sudo ps aux | grep java\n", + "\n", + "# Example for path and contents:\n", + "#\n", + "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", + "#\n", + "#build-server-jars.xml TCPServerMulti.jar\n", + "#RMIEchoServer.jar UDPServer.jar\n", + "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", + "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", + "#TCPServer.jar\n" + ] + ] + } + } + } + }, + "vpcCloudCompCounterDemo": { + "Type": "AWS::EC2::VPC", + "Properties": { + "CidrBlock": "10.0.0.0/16", + "EnableDnsSupport": "true", + "EnableDnsHostnames": "true", + "Tags": [ + { + "Key": "Name", + "Value": "vpcCloudCompCounterDemo" + } + ] + } + }, + "subnetCloudCompCounterDemoPublicSubnetAz1": { + "Type": "AWS::EC2::Subnet", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "CidrBlock": "10.0.0.0/24", + "AvailabilityZone": { + "Fn::Select": [ + "0", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + }, + "Tags": [ + { + "Key": "Name", + "Value": "subnetCloudCompCounterDemoPublicSubnetAz1" + } + ] + } + }, + "subnetCloudCompCounterDemoPublicSubnetAz2": { + "Type": "AWS::EC2::Subnet", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "CidrBlock": "10.0.1.0/24", + "AvailabilityZone": { + "Fn::Select": [ + "1", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + }, + "Tags": [ + { + "Key": "Name", + "Value": "subnetCloudCompCounterDemoPublicSubnetAz2" + } + ] + } + }, + "igCloudCompCounterDemo": { + "Type": "AWS::EC2::InternetGateway", + "Properties": { + "Tags": [ + { + "Key": "Name", + "Value": "igCloudCompCounterDemo" + } + ] + } + }, + "attachGateway": { + "Type": "AWS::EC2::VPCGatewayAttachment", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "InternetGatewayId": { + "Ref": "igCloudCompCounterDemo" + } + } + }, + "routetableViaIgw": { + "Type": "AWS::EC2::RouteTable", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "Tags": [ + { + "Key": "Name", + "Value": "routetableViaIgw" + } + ] + } + }, + "publicrouteViaIgw": { + "Type": "AWS::EC2::Route", + "DependsOn": "attachGateway", + "Properties": { + "RouteTableId": { + "Ref": "routetableViaIgw" + }, + "DestinationCidrBlock": "0.0.0.0/0", + "GatewayId": { + "Ref": "igCloudCompCounterDemo" + } + } + }, + "publicsubnet1RouteTableAssociation": { + "Type": "AWS::EC2::SubnetRouteTableAssociation", + "Properties": { + "SubnetId": { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" + }, + "RouteTableId": { + "Ref": "routetableViaIgw" + } + } + }, + "publicsubnet2RouteTableAssociation": { + "Type": "AWS::EC2::SubnetRouteTableAssociation", + "Properties": { + "SubnetId": { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" + }, + "RouteTableId": { + "Ref": "routetableViaIgw" + } + } + }, + "sgCloudCompDemoSecurityGroup": { + "Type": "AWS::EC2::SecurityGroup", + "Properties": { + "GroupDescription": "CloudComp Counter Demo", + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + } + } + }, + "ingress1": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress2": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "22", + "ToPort": "22", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress3": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "udp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "egress1": { + "Type": "AWS::EC2::SecurityGroupEgress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "-1", + "CidrIp": "0.0.0.0/0" + } + }, + "asgCloudCompAutoScaleGroup": { + "Type": "AWS::AutoScaling::AutoScalingGroup", + "Properties": { + "AvailabilityZones": [ + { + "Fn::Select": [ + "0", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + }, + { + "Fn::Select": [ + "1", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + } + ], + "TargetGroupARNs": [ + { + "Ref": "elbCloudCompTargetGroup" + } + ], + "Cooldown": "30", + "DesiredCapacity": "1", + "HealthCheckGracePeriod": "60", + "HealthCheckType": "EC2", + "MaxSize": "3", + "MinSize": "1", + "VPCZoneIdentifier": [ + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" + }, + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" + } + ], + "LaunchConfigurationName": { + "Ref": "lcVertSysAutoScaleConfigv11" + }, + "MetricsCollection": [ + { + "Granularity": "1Minute", + "Metrics": [ + "GroupPendingInstances", + "GroupMinSize", + "GroupDesiredCapacity", + "GroupTerminatingInstances", + "GroupInServiceInstances", + "GroupStandbyInstances", + "GroupMaxSize", + "GroupTotalInstances" + ] + } + ], + "TerminationPolicies": [ + "Default" + ] + } + }, + "sgCloudCompScalePolicy": { + "Type": "AWS::AutoScaling::ScalingPolicy", + "DependsOn": "elbCloudCompListener", + "Properties": { + "PolicyType": "TargetTrackingScaling", + "EstimatedInstanceWarmup": 60, + "TargetTrackingConfiguration": { + "DisableScaleIn": false, + "TargetValue": 5, + "PredefinedMetricSpecification": { + "PredefinedMetricType": "ALBRequestCountPerTarget", + "ResourceLabel": { + "Fn::Join": [ + "/", + [ + "app/elbCloudCompLoadBalancer", + { + "Fn::Select": [ + "3", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompLoadBalancer" + } + ] + } + ] + }, + "targetgroup/elbCloudCompTargetGroup", + { + "Fn::Select": [ + "2", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompTargetGroup" + } + ] + } + ] + } + ] + ] + } + } + }, + "AutoScalingGroupName": { + "Ref": "asgCloudCompAutoScaleGroup" + } + } + }, + "elbCloudCompLoadBalancer": { + "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", + "Properties": { + "Name": "elbCloudCompLoadBalancer", + "IpAddressType": "ipv4", + "Type": "application", + "Scheme": "internet-facing", + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "Subnets": [ + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" + }, + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" + } + ] + } + }, + "elbCloudCompTargetGroup": { + "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", + "Properties": { + "Port": 36042, + "HealthCheckIntervalSeconds": 30, + "HealthCheckTimeoutSeconds": 5, + "HealthyThresholdCount": 2, + "UnhealthyThresholdCount": 2, + "HealthCheckPath": "/counter", + "HealthCheckProtocol": "HTTP", + "TargetGroupAttributes": [ + { + "Key": "deregistration_delay.timeout_seconds", + "Value": "20" + } + ], + "Protocol": "HTTP", + "TargetType": "instance", + "Matcher": { + "HttpCode": "200" + }, + "Name": "elbCloudCompTargetGroup", + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + } + } + }, + "elbCloudCompListener": { + "Type": "AWS::ElasticLoadBalancingV2::Listener", + "Properties": { + "LoadBalancerArn": { + "Ref": "elbCloudCompLoadBalancer" + }, + "Protocol": "HTTP", + "Port": 36042, + "DefaultActions": [ + { + "Type": "forward", + "TargetGroupArn": { + "Ref": "elbCloudCompTargetGroup" + } + } + ] + } + } + }, + "Outputs": { + "LoadBalancer": { + "Description": "Load Balancer", + "Value": { + "Ref": "elbCloudCompLoadBalancer" + } + }, + "LoadBalancerDns": { + "Description": "Load Balancer DNS", + "Value": { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + } + }, + "LoadBalancerURL": { + "Description": "Load Balancer URL", + "Value": { + "Fn::Join": [ + ":", + [ + { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + }, + "36042/counter" + ] + ] + } + } + }, + "Description": "CloudComp Counter Demo" } \ No newline at end of file diff --git a/aws-cloudformation-demo/cloudcomp-counter-demo.json b/example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo.json similarity index 96% rename from aws-cloudformation-demo/cloudcomp-counter-demo.json rename to example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo.json index 1814e58..27a8d55 100644 --- a/aws-cloudformation-demo/cloudcomp-counter-demo.json +++ b/example-projects/counter-demo/aws-cloudformation-demo/cloudcomp-counter-demo.json @@ -1,394 +1,394 @@ -{ - "AWSTemplateFormatVersion": "2010-09-09", - "Parameters": { - "paramImageID": { - "Type": "AWS::EC2::Image::Id", - "Default": "ami-f573e19a", - "Description": "Amazon Image ID" - }, - "paramInstanceType": { - "Type": "String", - "Default": "t2.nano", - "AllowedValues": [ - "t2.nano", - "t2.micro", - "m1.small" - ], - "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." - }, - "paramKeyPair": { - "Type": "AWS::EC2::KeyPair::KeyName", - "Description": "Amazon EC2 Key Pair" - }, - "paramIamInstanceRole": { - "Type": "String", - "Default": "ec2-s3-vertsys-access-role", - "Description": "IAM Instance Role" - }, - "paramVPC": { - "Type": "AWS::EC2::VPC::Id", - "Description": "VPC" - }, - "paramSubnetIDs": { - "Type": "List", - "Description": "Subnet IDs" - }, - "paramAvailabilityZones": { - "Type": "List", - "Description": "AvailabilityZones" - } - }, - "Resources": { - "lcVertSysAutoScaleConfigv11": { - "Type": "AWS::AutoScaling::LaunchConfiguration", - "Properties": { - "AssociatePublicIpAddress": true, - "ImageId": { - "Ref": "paramImageID" - }, - "InstanceType": { - "Ref": "paramInstanceType" - }, - "KeyName": { - "Ref": "paramKeyPair" - }, - "IamInstanceProfile": { - "Ref": "paramIamInstanceRole" - }, - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "UserData": { - "Fn::Base64": { - "Fn::Join": [ - "", - [ - "#!/bin/bash\n", - "\n", - "# this script will be run during the boot process by each VertSys instance created\n", - "# in AWS currently this is a plain bash script that requires a RedHat based image\n", - "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", - "# distros\n", - "#\n", - "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", - "\n", - "# Config\n", - "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", - "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", - "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", - "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", - "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", - "\n", - "# Create path to run the script\n", - "mkdir $SCRIPT_ROOT_PATH\n", - "cd $SCRIPT_ROOT_PATH\n", - "\n", - "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", - "wget http://169.254.169.254/latest/user-data\n", - "chmod +x user-data\n", - "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", - "\n", - "# setting console prompt to include location (availability zone and region in AWS)\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", - "\n", - "# wait for internet connection, should not be necessary, but just in case ;)\n", - "while ! ping -c 1 -W 1 8.8.8.8; do\n", - " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", - " sleep 1\n", - "done\n", - "\n", - "# installation of required packages\n", - "echo \"Installing packages...\"\n", - "sudo yum update -y\n", - "sudo yum install -y java git\n", - "#rm -rf verteilte-systeme-bsc-ai-examples\n", - "if [ ! -d $VERTSYS_PATH ]; then\n", - " echo \"Cloning repo...\"\n", - " git clone $REPO\n", - "fi\n", - "\n", - "# killall running screens, .e.g to cleanup if script is run again after boot\n", - "killall screen\n", - "# start all jars\n", - "echo \"Starting JARS: ${JARS}...\"\n", - "for JAR in $JARS; do\n", - " echo \"Starting ${JAR}...\"\n", - " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", - "done\n", - "\n", - "# wait a second, to allow java services to start\n", - "sleep 1\n", - "\n", - "# output status of ports 36000-36199 and all running processes\n", - "echo \"Status:\"\n", - "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", - "sudo ps aux | grep java\n", - "\n", - "# Example for path and contents:\n", - "#\n", - "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", - "#\n", - "#build-server-jars.xml TCPServerMulti.jar\n", - "#RMIEchoServer.jar UDPServer.jar\n", - "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", - "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", - "#TCPServer.jar\n" - ] - ] - } - } - } - }, - "sgCloudCompDemoSecurityGroup": { - "Type": "AWS::EC2::SecurityGroup", - "Properties": { - "GroupDescription": "CloudComp Counter Demo", - "VpcId": { - "Ref": "paramVPC" - } - } - }, - "ingress1": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress2": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "22", - "ToPort": "22", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress3": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "udp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "egress1": { - "Type": "AWS::EC2::SecurityGroupEgress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "-1", - "CidrIp": "0.0.0.0/0" - } - }, - "asgCloudCompAutoScaleGroup": { - "Type": "AWS::AutoScaling::AutoScalingGroup", - "Properties": { - "AvailabilityZones": { - "Ref": "paramAvailabilityZones" - }, - "TargetGroupARNs": [ - { - "Ref": "elbCloudCompTargetGroup" - } - ], - "Cooldown": "30", - "DesiredCapacity": "1", - "HealthCheckGracePeriod": "60", - "HealthCheckType": "EC2", - "MaxSize": "3", - "MinSize": "1", - "VPCZoneIdentifier": { - "Ref": "paramSubnetIDs" - }, - "LaunchConfigurationName": { - "Ref": "lcVertSysAutoScaleConfigv11" - }, - "MetricsCollection": [ - { - "Granularity": "1Minute", - "Metrics": [ - "GroupPendingInstances", - "GroupMinSize", - "GroupDesiredCapacity", - "GroupTerminatingInstances", - "GroupInServiceInstances", - "GroupStandbyInstances", - "GroupMaxSize", - "GroupTotalInstances" - ] - } - ], - "TerminationPolicies": [ - "Default" - ] - } - }, - "sgCloudCompScalePolicy": { - "Type": "AWS::AutoScaling::ScalingPolicy", - "DependsOn": "elbCloudCompListener", - "Properties": { - "PolicyType": "TargetTrackingScaling", - "EstimatedInstanceWarmup": 60, - "TargetTrackingConfiguration": { - "DisableScaleIn": false, - "TargetValue": 5, - "PredefinedMetricSpecification": { - "PredefinedMetricType": "ALBRequestCountPerTarget", - "ResourceLabel": { - "Fn::Join": [ - "/", - [ - "app/elbCloudCompLoadBalancer", - { - "Fn::Select": [ - "3", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompLoadBalancer" - } - ] - } - ] - }, - "targetgroup/elbCloudCompTargetGroup", - { - "Fn::Select": [ - "2", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompTargetGroup" - } - ] - } - ] - } - ] - ] - } - } - }, - "AutoScalingGroupName": { - "Ref": "asgCloudCompAutoScaleGroup" - } - } - }, - "elbCloudCompLoadBalancer": { - "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", - "Properties": { - "Name": "elbCloudCompLoadBalancer", - "IpAddressType": "ipv4", - "Type": "application", - "Scheme": "internet-facing", - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "Subnets": { - "Ref": "paramSubnetIDs" - } - } - }, - "elbCloudCompTargetGroup": { - "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", - "Properties": { - "Port": 36042, - "HealthCheckIntervalSeconds": 30, - "HealthCheckTimeoutSeconds": 5, - "HealthyThresholdCount": 2, - "UnhealthyThresholdCount": 2, - "HealthCheckPath": "/counter", - "HealthCheckProtocol": "HTTP", - "TargetGroupAttributes": [ - { - "Key": "deregistration_delay.timeout_seconds", - "Value": "20" - } - ], - "Protocol": "HTTP", - "TargetType": "instance", - "Matcher": { - "HttpCode": "200" - }, - "Name": "elbCloudCompTargetGroup", - "VpcId": { - "Ref": "paramVPC" - } - } - }, - "elbCloudCompListener": { - "Type": "AWS::ElasticLoadBalancingV2::Listener", - "Properties": { - "LoadBalancerArn": { - "Ref": "elbCloudCompLoadBalancer" - }, - "Protocol": "HTTP", - "Port": 36042, - "DefaultActions": [ - { - "Type": "forward", - "TargetGroupArn": { - "Ref": "elbCloudCompTargetGroup" - } - } - ] - } - } - }, - "Outputs": { - "LoadBalancer": { - "Description": "Load Balancer", - "Value": { - "Ref": "elbCloudCompLoadBalancer" - } - }, - "LoadBalancerDns": { - "Description": "Load Balancer DNS", - "Value": { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - } - }, - "LoadBalancerURL": { - "Description": "Load Balancer URL", - "Value": { - "Fn::Join": [ - ":", - [ - { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - }, - "36042/counter" - ] - ] - } - } - }, - "Description": "CloudComp Counter Demo" +{ + "AWSTemplateFormatVersion": "2010-09-09", + "Parameters": { + "paramImageID": { + "Type": "AWS::EC2::Image::Id", + "Default": "ami-f573e19a", + "Description": "Amazon Image ID" + }, + "paramInstanceType": { + "Type": "String", + "Default": "t2.nano", + "AllowedValues": [ + "t2.nano", + "t2.micro", + "m1.small" + ], + "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." + }, + "paramKeyPair": { + "Type": "AWS::EC2::KeyPair::KeyName", + "Description": "Amazon EC2 Key Pair" + }, + "paramIamInstanceRole": { + "Type": "String", + "Default": "ec2-s3-vertsys-access-role", + "Description": "IAM Instance Role" + }, + "paramVPC": { + "Type": "AWS::EC2::VPC::Id", + "Description": "VPC" + }, + "paramSubnetIDs": { + "Type": "List", + "Description": "Subnet IDs" + }, + "paramAvailabilityZones": { + "Type": "List", + "Description": "AvailabilityZones" + } + }, + "Resources": { + "lcVertSysAutoScaleConfigv11": { + "Type": "AWS::AutoScaling::LaunchConfiguration", + "Properties": { + "AssociatePublicIpAddress": true, + "ImageId": { + "Ref": "paramImageID" + }, + "InstanceType": { + "Ref": "paramInstanceType" + }, + "KeyName": { + "Ref": "paramKeyPair" + }, + "IamInstanceProfile": { + "Ref": "paramIamInstanceRole" + }, + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "UserData": { + "Fn::Base64": { + "Fn::Join": [ + "", + [ + "#!/bin/bash\n", + "\n", + "# this script will be run during the boot process by each VertSys instance created\n", + "# in AWS currently this is a plain bash script that requires a RedHat based image\n", + "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", + "# distros\n", + "#\n", + "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", + "\n", + "# Config\n", + "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", + "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", + "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", + "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", + "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", + "\n", + "# Create path to run the script\n", + "mkdir $SCRIPT_ROOT_PATH\n", + "cd $SCRIPT_ROOT_PATH\n", + "\n", + "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", + "wget http://169.254.169.254/latest/user-data\n", + "chmod +x user-data\n", + "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", + "\n", + "# setting console prompt to include location (availability zone and region in AWS)\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", + "\n", + "# wait for internet connection, should not be necessary, but just in case ;)\n", + "while ! ping -c 1 -W 1 8.8.8.8; do\n", + " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", + " sleep 1\n", + "done\n", + "\n", + "# installation of required packages\n", + "echo \"Installing packages...\"\n", + "sudo yum update -y\n", + "sudo yum install -y java git\n", + "#rm -rf verteilte-systeme-bsc-ai-examples\n", + "if [ ! -d $VERTSYS_PATH ]; then\n", + " echo \"Cloning repo...\"\n", + " git clone $REPO\n", + "fi\n", + "\n", + "# killall running screens, .e.g to cleanup if script is run again after boot\n", + "killall screen\n", + "# start all jars\n", + "echo \"Starting JARS: ${JARS}...\"\n", + "for JAR in $JARS; do\n", + " echo \"Starting ${JAR}...\"\n", + " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", + "done\n", + "\n", + "# wait a second, to allow java services to start\n", + "sleep 1\n", + "\n", + "# output status of ports 36000-36199 and all running processes\n", + "echo \"Status:\"\n", + "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", + "sudo ps aux | grep java\n", + "\n", + "# Example for path and contents:\n", + "#\n", + "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", + "#\n", + "#build-server-jars.xml TCPServerMulti.jar\n", + "#RMIEchoServer.jar UDPServer.jar\n", + "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", + "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", + "#TCPServer.jar\n" + ] + ] + } + } + } + }, + "sgCloudCompDemoSecurityGroup": { + "Type": "AWS::EC2::SecurityGroup", + "Properties": { + "GroupDescription": "CloudComp Counter Demo", + "VpcId": { + "Ref": "paramVPC" + } + } + }, + "ingress1": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress2": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "22", + "ToPort": "22", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress3": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "udp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "egress1": { + "Type": "AWS::EC2::SecurityGroupEgress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "-1", + "CidrIp": "0.0.0.0/0" + } + }, + "asgCloudCompAutoScaleGroup": { + "Type": "AWS::AutoScaling::AutoScalingGroup", + "Properties": { + "AvailabilityZones": { + "Ref": "paramAvailabilityZones" + }, + "TargetGroupARNs": [ + { + "Ref": "elbCloudCompTargetGroup" + } + ], + "Cooldown": "30", + "DesiredCapacity": "1", + "HealthCheckGracePeriod": "60", + "HealthCheckType": "EC2", + "MaxSize": "3", + "MinSize": "1", + "VPCZoneIdentifier": { + "Ref": "paramSubnetIDs" + }, + "LaunchConfigurationName": { + "Ref": "lcVertSysAutoScaleConfigv11" + }, + "MetricsCollection": [ + { + "Granularity": "1Minute", + "Metrics": [ + "GroupPendingInstances", + "GroupMinSize", + "GroupDesiredCapacity", + "GroupTerminatingInstances", + "GroupInServiceInstances", + "GroupStandbyInstances", + "GroupMaxSize", + "GroupTotalInstances" + ] + } + ], + "TerminationPolicies": [ + "Default" + ] + } + }, + "sgCloudCompScalePolicy": { + "Type": "AWS::AutoScaling::ScalingPolicy", + "DependsOn": "elbCloudCompListener", + "Properties": { + "PolicyType": "TargetTrackingScaling", + "EstimatedInstanceWarmup": 60, + "TargetTrackingConfiguration": { + "DisableScaleIn": false, + "TargetValue": 5, + "PredefinedMetricSpecification": { + "PredefinedMetricType": "ALBRequestCountPerTarget", + "ResourceLabel": { + "Fn::Join": [ + "/", + [ + "app/elbCloudCompLoadBalancer", + { + "Fn::Select": [ + "3", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompLoadBalancer" + } + ] + } + ] + }, + "targetgroup/elbCloudCompTargetGroup", + { + "Fn::Select": [ + "2", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompTargetGroup" + } + ] + } + ] + } + ] + ] + } + } + }, + "AutoScalingGroupName": { + "Ref": "asgCloudCompAutoScaleGroup" + } + } + }, + "elbCloudCompLoadBalancer": { + "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", + "Properties": { + "Name": "elbCloudCompLoadBalancer", + "IpAddressType": "ipv4", + "Type": "application", + "Scheme": "internet-facing", + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "Subnets": { + "Ref": "paramSubnetIDs" + } + } + }, + "elbCloudCompTargetGroup": { + "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", + "Properties": { + "Port": 36042, + "HealthCheckIntervalSeconds": 30, + "HealthCheckTimeoutSeconds": 5, + "HealthyThresholdCount": 2, + "UnhealthyThresholdCount": 2, + "HealthCheckPath": "/counter", + "HealthCheckProtocol": "HTTP", + "TargetGroupAttributes": [ + { + "Key": "deregistration_delay.timeout_seconds", + "Value": "20" + } + ], + "Protocol": "HTTP", + "TargetType": "instance", + "Matcher": { + "HttpCode": "200" + }, + "Name": "elbCloudCompTargetGroup", + "VpcId": { + "Ref": "paramVPC" + } + } + }, + "elbCloudCompListener": { + "Type": "AWS::ElasticLoadBalancingV2::Listener", + "Properties": { + "LoadBalancerArn": { + "Ref": "elbCloudCompLoadBalancer" + }, + "Protocol": "HTTP", + "Port": 36042, + "DefaultActions": [ + { + "Type": "forward", + "TargetGroupArn": { + "Ref": "elbCloudCompTargetGroup" + } + } + ] + } + } + }, + "Outputs": { + "LoadBalancer": { + "Description": "Load Balancer", + "Value": { + "Ref": "elbCloudCompLoadBalancer" + } + }, + "LoadBalancerDns": { + "Description": "Load Balancer DNS", + "Value": { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + } + }, + "LoadBalancerURL": { + "Description": "Load Balancer URL", + "Value": { + "Fn::Join": [ + ":", + [ + { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + }, + "36042/counter" + ] + ] + } + } + }, + "Description": "CloudComp Counter Demo" } \ No newline at end of file diff --git a/example-projects/tug-of-war-in-the-clouds/start.py b/example-projects/tug-of-war-in-the-clouds/start.py new file mode 100644 index 0000000..a93ca1f --- /dev/null +++ b/example-projects/tug-of-war-in-the-clouds/start.py @@ -0,0 +1,184 @@ +import boto3 +from botocore.exceptions import ClientError + +region = 'eu-central-1' +availabilityZone = 'eu-central-1b' +imageId = 'ami-0cc293023f983ed53' +instanceType = 't3.nano' +keyName = 'srieger-pub' +userDataDB = ('#!/bin/bash\n' + '#!/bin/bash\n' + '# extra repo for RedHat rpms\n' + 'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' + '# essential tools\n' + 'yum install -y joe htop git\n' + '# mysql\n' + 'yum install -y mariadb mariadb-server\n' + '\n' + 'service mariadb start\n' + '\n' + 'echo "create database cloud_tug_of_war" | mysql -u root\n' + '\n' + 'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n' + '\n' + 'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloud\';" | mysql -u root\n' + 'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n' + 'echo "FLUSH PRIVILEGES" | mysql -u root\n' + ) + +# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/" + +client = boto3.setup_default_session(region_name=region) +ec2Client = boto3.client("ec2") +ec2Resource = boto3.resource('ec2') + +response = ec2Client.describe_vpcs() +vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') +subnet_id = ec2Client.describe_subnets( + Filters=[ + { + 'Name': 'availability-zone', 'Values': [availabilityZone] + } + ])['Subnets'][0]['SubnetId'] + +print("Deleting old instance...") +print("------------------------------------") + +response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}]) +print(response) +reservations = response['Reservations'] +for reservation in reservations: + for instance in reservation['Instances']: + if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending": + response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']]) + print(response) + instanceToTerminate = ec2Resource.Instance(instance['InstanceId']) + instanceToTerminate.wait_until_terminated() + +print("Delete old security group...") +print("------------------------------------") + +try: + response = ec2Client.delete_security_group(GroupName='tug-of-war') +except ClientError as e: + print(e) + +print("Create security group...") +print("------------------------------------") + +try: + response = ec2Client.create_security_group(GroupName='tug-of-war', + Description='tug-of-war', + VpcId=vpc_id) + security_group_id = response['GroupId'] + print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id)) + + data = ec2Client.authorize_security_group_ingress( + GroupId=security_group_id, + IpPermissions=[ + {'IpProtocol': 'tcp', + 'FromPort': 3306, + 'ToPort': 3306, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, + {'IpProtocol': 'tcp', + 'FromPort': 22, + 'ToPort': 22, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, + {'IpProtocol': 'tcp', + 'FromPort': 80, + 'ToPort': 80, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, + {'IpProtocol': 'tcp', + 'FromPort': 443, + 'ToPort': 443, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]} + ]) + print('Ingress Successfully Set %s' % data) +except ClientError as e: + print(e) + +print("Running new DB instance...") +print("------------------------------------") + +response = ec2Client.run_instances( + ImageId=imageId, + InstanceType=instanceType, + Placement={'AvailabilityZone': availabilityZone, }, + KeyName=keyName, + MinCount=1, + MaxCount=1, + UserData=userDataDB, + SecurityGroupIds=[ + security_group_id, + ], + TagSpecifications=[ + { + 'ResourceType': 'instance', + 'Tags': [ + {'Key': 'Name', 'Value': 'tug-of-war-db1'}, + {'Key': 'tug-of-war', 'Value': 'installed'} + ], + } + ], +) + +instanceIdDB = response['Instances'][0]['InstanceId'] +privateIpDB = response['Instances'][0]['PrivateIpAddress'] +#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] + +instance = ec2Resource.Instance(instanceIdDB) +instance.wait_until_running() + +print(instanceIdDB) + +userDataWebServer = ('#!/bin/bash\n' + '# extra repo for RedHat rpms\n' + 'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' + '# essential tools\n' + 'yum install -y joe htop git\n' + '# mysql\n' + 'yum install -y httpd php php-mysql\n' + '\n' + 'service httpd start\n' + '\n' + 'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n' + 'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n' + 'cd /var/www/html\n' + 'tar zxvf tug-of-war-in-the-clouds.tar.gz\n' + '\n' + '# change hostname of db connection\n' + 'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n' + ) + +print("Running new Web Server instance...") +print("------------------------------------") + +response = ec2Client.run_instances( + ImageId=imageId, + InstanceType=instanceType, + Placement={'AvailabilityZone': availabilityZone, }, + KeyName=keyName, + MinCount=1, + MaxCount=1, + UserData=userDataWebServer, + SecurityGroupIds=[ + security_group_id, + ], + + TagSpecifications=[ + { + 'ResourceType': 'instance', + 'Tags': [ + {'Key': 'Name', 'Value': 'tug-of-war-webserver1'}, + {'Key': 'tug-of-war', 'Value': 'installed'} + ], + } + ], +) + +instanceIdDB = response['Instances'][0]['InstanceId'] +privateIpDB = response['Instances'][0]['PrivateIpAddress'] +#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] + +instance = ec2Resource.Instance(instanceIdDB) +instance.wait_until_running() diff --git a/aws-turnserver/stop.py b/example-projects/tug-of-war-in-the-clouds/stop.py similarity index 69% rename from aws-turnserver/stop.py rename to example-projects/tug-of-war-in-the-clouds/stop.py index bb4acb0..106b987 100644 --- a/aws-turnserver/stop.py +++ b/example-projects/tug-of-war-in-the-clouds/stop.py @@ -13,7 +13,7 @@ vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') print("Deleting old instance...") print("------------------------------------") -response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}]) +response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}]) print(response) reservations = response['Reservations'] for reservation in reservations: @@ -28,18 +28,6 @@ print("Delete old security group...") print("------------------------------------") try: - response = ec2Client.delete_security_group(GroupName='coturn') + response = ec2Client.delete_security_group(GroupName='tug-of-war') except ClientError as e: print(e) - -print("Delete old elastic ips...") -print("------------------------------------") - -try: - response = ec2Client.describe_addresses(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}]) - addresses = response['Addresses'] - for address in addresses: - ec2Client.release_address(AllocationId=address['AllocationId']) -except ClientError as e: - print(e) -