Sebastian Rieger
5 years ago
10 changed files with 1157 additions and 1193 deletions
-
11.idea/cloud-computing-msc-ai-examples.iml
-
7.idea/misc.xml
-
8.idea/modules.xml
-
7.idea/vcs.xml
-
241aws-turnserver/start.py
-
0example-projects/counter-demo/aws-cloudformation/cloudcomp-counter-demo-with-vpc-designer.png
-
1090example-projects/counter-demo/aws-cloudformation/cloudcomp-counter-demo-with-vpc.json
-
786example-projects/counter-demo/aws-cloudformation/cloudcomp-counter-demo.json
-
184example-projects/tug-of-war-in-the-clouds/aws-boto3-standalone-db/start.py
-
16example-projects/tug-of-war-in-the-clouds/aws-boto3-standalone-db/stop.py
@ -0,0 +1,11 @@ |
|||||
|
<?xml version="1.0" encoding="UTF-8"?> |
||||
|
<module type="PYTHON_MODULE" version="4"> |
||||
|
<component name="NewModuleRootManager"> |
||||
|
<content url="file://$MODULE_DIR$" /> |
||||
|
<orderEntry type="inheritedJdk" /> |
||||
|
<orderEntry type="sourceFolder" forTests="false" /> |
||||
|
</component> |
||||
|
<component name="TestRunnerService"> |
||||
|
<option name="PROJECT_TEST_RUNNER" value="Unittests" /> |
||||
|
</component> |
||||
|
</module> |
@ -0,0 +1,7 @@ |
|||||
|
<?xml version="1.0" encoding="UTF-8"?> |
||||
|
<project version="4"> |
||||
|
<component name="JavaScriptSettings"> |
||||
|
<option name="languageLevel" value="ES6" /> |
||||
|
</component> |
||||
|
<component name="ProjectRootManager" version="2" project-jdk-name="Python 3.6" project-jdk-type="Python SDK" /> |
||||
|
</project> |
@ -0,0 +1,8 @@ |
|||||
|
<?xml version="1.0" encoding="UTF-8"?> |
||||
|
<project version="4"> |
||||
|
<component name="ProjectModuleManager"> |
||||
|
<modules> |
||||
|
<module fileurl="file://$PROJECT_DIR$/.idea/cloud-computing-msc-ai-examples.iml" filepath="$PROJECT_DIR$/.idea/cloud-computing-msc-ai-examples.iml" /> |
||||
|
</modules> |
||||
|
</component> |
||||
|
</project> |
@ -0,0 +1,7 @@ |
|||||
|
<?xml version="1.0" encoding="UTF-8"?> |
||||
|
<project version="4"> |
||||
|
<component name="VcsDirectoryMappings"> |
||||
|
<mapping directory="$PROJECT_DIR$" vcs="Git" /> |
||||
|
<mapping directory="$PROJECT_DIR$/aws-tug-of-war-in-the-clouds" vcs="Git" /> |
||||
|
</component> |
||||
|
</project> |
@ -1,241 +0,0 @@ |
|||||
import boto3 |
|
||||
from botocore.exceptions import ClientError |
|
||||
|
|
||||
region = 'eu-central-1' |
|
||||
availabilityZone = 'eu-central-1b' |
|
||||
imageId = 'ami-0cc293023f983ed53' |
|
||||
instanceType = 't3.nano' |
|
||||
keyName = 'srieger-pub' |
|
||||
userData = ('#!/bin/bash\n' |
|
||||
'COTURN_VERSION="4.5.1.1"\n' |
|
||||
'LIBEVENT_VERSION="2.0.21"\n' |
|
||||
'\n' |
|
||||
'# extra repo for RedHat rpms\n' |
|
||||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' |
|
||||
'# essential tools\n' |
|
||||
'yum install -y joe htop git\n' |
|
||||
'# coturn requirements\n' |
|
||||
'yum install -y gcc openssl-devel\n' |
|
||||
'yum install -y sqlite-devel mysql-devel hiredis-devel mongo-c-driver-devel\n' |
|
||||
'\n' |
|
||||
'### libevent installation ###\n' |
|
||||
'wget https://github.com/downloads/libevent/libevent/libevent-$LIBEVENT_VERSION-stable.tar.gz\n' |
|
||||
'\n' |
|
||||
'tar xvfz libevent-$LIBEVENT_VERSION-stable.tar.gz\n' |
|
||||
'cd libevent-$LIBEVENT_VERSION-stable\n' |
|
||||
'./configure\n' |
|
||||
'make\n' |
|
||||
'make install\n' |
|
||||
'\n' |
|
||||
'### turnserver installation ###\n' |
|
||||
'wget https://coturn.net/turnserver/v$COTURN_VERSION/turnserver-$COTURN_VERSION.tar.gz\n' |
|
||||
'tar xvfz turnserver-$COTURN_VERSION.tar.gz\n' |
|
||||
'cd turnserver-$COTURN_VERSION\n' |
|
||||
'./configure\n' |
|
||||
'make\n' |
|
||||
'make install\n' |
|
||||
'\n' |
|
||||
'openssl req -new -subj "/CN=coturn" -newkey rsa:4096 -x509 -sha256 -days 365 -nodes -out /usr/local/etc/turn_server_cert.pem -keyout /usr/local/etc/turn_server_pkey.pem\n' |
|
||||
'\n' |
|
||||
'/usr/local/bin/turnadmin -a -u srieger -r hs-fulda.de -p coturnserver2019\n' |
|
||||
'/usr/local/bin/turnadmin -A -u srieger -p coturnserver2019\n' |
|
||||
'\n' |
|
||||
'MAC_ETH0=$(cat /sys/class/net/eth0/address)\n' |
|
||||
'MAC_ETH1=$(cat /sys/class/net/eth1/address)\n' |
|
||||
'LOCAL_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/local-ipv4s)\n' |
|
||||
'LOCAL_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/local-ipv4s)\n' |
|
||||
'PUBLIC_IPV4S_ETH0=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH0/public-ipv4s)\n' |
|
||||
'PUBLIC_IPV4S_ETH1=$(curl http://169.254.169.254/latest/meta-data/network/interfaces/macs/$MAC_ETH1/public-ipv4s)\n' |
|
||||
'\n' |
|
||||
'cat <<EOF > /usr/local/etc/turnserver.conf\n' |
|
||||
'verbose\n' |
|
||||
'listening-ip=$LOCAL_IPV4S_ETH0\n' |
|
||||
'listening-ip=$LOCAL_IPV4S_ETH1\n' |
|
||||
'relay-ip=$LOCAL_IPV4S_ETH0\n' |
|
||||
'relay-ip=$LOCAL_IPV4S_ETH1\n' |
|
||||
'external-ip=$PUBLIC_IPV4S_ETH0/$LOCAL_IPV4S_ETH0\n' |
|
||||
'external-ip=$PUBLIC_IPV4S_ETH1/$LOCAL_IPV4S_ETH1\n' |
|
||||
'fingerprint\n' |
|
||||
'lt-cred-mech\n' |
|
||||
'#use-auth-secret\n' |
|
||||
'#static-auth-secret=751c45cae60a2839711a94c8d6bf0089e78b2149ca602fdXXXXXXXXXXXXXXXXX\n' |
|
||||
'realm=hs-fulda.de\n' |
|
||||
'total-quota=100\n' |
|
||||
'stale-nonce\n' |
|
||||
'cipher-list="ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AES:RSA+3DES:!ADH:!AECDH:!MD5"\n' |
|
||||
'#no-stun\n' |
|
||||
'#no-loopback-peers\n' |
|
||||
'#no-multicast-peers\n' |
|
||||
'cli-password=coturnserver2019\n' |
|
||||
'web-admin\n' |
|
||||
'web-admin-ip=$LOCAL_IPV4S_ETH0\n' |
|
||||
'EOF\n' |
|
||||
'\n' |
|
||||
'/usr/local/bin/turnserver\n' |
|
||||
) |
|
||||
|
|
||||
# convert with: cat install-coturn | sed "s/^/'/; s/$/\\\n'/" |
|
||||
|
|
||||
client = boto3.setup_default_session(region_name=region) |
|
||||
ec2Client = boto3.client("ec2") |
|
||||
ec2Resource = boto3.resource('ec2') |
|
||||
|
|
||||
response = ec2Client.describe_vpcs() |
|
||||
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') |
|
||||
subnet_id = ec2Client.describe_subnets( |
|
||||
Filters=[ |
|
||||
{ |
|
||||
'Name': 'availability-zone', 'Values': [availabilityZone] |
|
||||
} |
|
||||
])['Subnets'][0]['SubnetId'] |
|
||||
|
|
||||
print("Deleting old instance...") |
|
||||
print("------------------------------------") |
|
||||
|
|
||||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}]) |
|
||||
print(response) |
|
||||
reservations = response['Reservations'] |
|
||||
for reservation in reservations: |
|
||||
for instance in reservation['Instances']: |
|
||||
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending": |
|
||||
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']]) |
|
||||
print(response) |
|
||||
instanceToTerminate = ec2Resource.Instance(instance['InstanceId']) |
|
||||
instanceToTerminate.wait_until_terminated() |
|
||||
|
|
||||
print("Delete old security group...") |
|
||||
print("------------------------------------") |
|
||||
|
|
||||
try: |
|
||||
response = ec2Client.delete_security_group(GroupName='coturn') |
|
||||
except ClientError as e: |
|
||||
print(e) |
|
||||
|
|
||||
print("Delete old elastic ips...") |
|
||||
print("------------------------------------") |
|
||||
|
|
||||
try: |
|
||||
response = ec2Client.describe_addresses(Filters=[{'Name': 'tag-key', 'Values': ['coturn']}]) |
|
||||
addresses = response['Addresses'] |
|
||||
for address in addresses: |
|
||||
ec2Client.release_address(AllocationId=address['AllocationId']) |
|
||||
except ClientError as e: |
|
||||
print(e) |
|
||||
|
|
||||
print("Create security group...") |
|
||||
print("------------------------------------") |
|
||||
|
|
||||
try: |
|
||||
response = ec2Client.create_security_group(GroupName='coturn', |
|
||||
Description='coturn', |
|
||||
VpcId=vpc_id) |
|
||||
security_group_id = response['GroupId'] |
|
||||
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id)) |
|
||||
|
|
||||
data = ec2Client.authorize_security_group_ingress( |
|
||||
GroupId=security_group_id, |
|
||||
IpPermissions=[ |
|
||||
{'IpProtocol': 'tcp', |
|
||||
'FromPort': 3478, |
|
||||
'ToPort': 3478, |
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|
||||
{'IpProtocol': 'udp', |
|
||||
'FromPort': 3478, |
|
||||
'ToPort': 3478, |
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|
||||
{'IpProtocol': 'tcp', |
|
||||
'FromPort': 5349, |
|
||||
'ToPort': 5349, |
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|
||||
{'IpProtocol': 'udp', |
|
||||
'FromPort': 5349, |
|
||||
'ToPort': 5349, |
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|
||||
{'IpProtocol': 'tcp', |
|
||||
'FromPort': 8080, |
|
||||
'ToPort': 8080, |
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|
||||
{'IpProtocol': 'udp', |
|
||||
'FromPort': 49152, |
|
||||
'ToPort': 65535, |
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|
||||
{'IpProtocol': 'tcp', |
|
||||
'FromPort': 22, |
|
||||
'ToPort': 22, |
|
||||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]} |
|
||||
]) |
|
||||
print('Ingress Successfully Set %s' % data) |
|
||||
except ClientError as e: |
|
||||
print(e) |
|
||||
|
|
||||
print("Allocate additional elastic ips...") |
|
||||
print("------------------------------------") |
|
||||
|
|
||||
response = ec2Client.allocate_address( |
|
||||
Domain='vpc', |
|
||||
) |
|
||||
firstIpAddressAllocationId = response['AllocationId'] |
|
||||
ec2Client.create_tags(Resources=[firstIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}]) |
|
||||
|
|
||||
response = ec2Client.allocate_address( |
|
||||
Domain='vpc', |
|
||||
) |
|
||||
secondIpAddressAllocationId = response['AllocationId'] |
|
||||
ec2Client.create_tags(Resources=[secondIpAddressAllocationId], Tags=[{'Key': 'coturn', 'Value': 'installed'}]) |
|
||||
|
|
||||
print("Running new instance...") |
|
||||
print("------------------------------------") |
|
||||
|
|
||||
response = ec2Client.run_instances( |
|
||||
ImageId=imageId, |
|
||||
InstanceType=instanceType, |
|
||||
Placement={'AvailabilityZone': availabilityZone, }, |
|
||||
KeyName=keyName, |
|
||||
MinCount=1, |
|
||||
MaxCount=1, |
|
||||
UserData=userData, |
|
||||
NetworkInterfaces=[ |
|
||||
{ |
|
||||
'DeviceIndex': 0, |
|
||||
'Groups': [ |
|
||||
security_group_id, |
|
||||
], |
|
||||
'SubnetId': subnet_id, |
|
||||
}, |
|
||||
{ |
|
||||
'DeviceIndex': 1, |
|
||||
'Groups': [ |
|
||||
security_group_id, |
|
||||
], |
|
||||
'SubnetId': subnet_id, |
|
||||
}, |
|
||||
], |
|
||||
TagSpecifications=[ |
|
||||
{ |
|
||||
'ResourceType': 'instance', |
|
||||
'Tags': [ |
|
||||
{'Key': 'coturn', 'Value': 'installed'} |
|
||||
], |
|
||||
} |
|
||||
], |
|
||||
) |
|
||||
|
|
||||
instanceId = response['Instances'][0]['InstanceId'] |
|
||||
firstNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] |
|
||||
secondNetworkInterfaceId = response['Instances'][0]['NetworkInterfaces'][1]['NetworkInterfaceId'] |
|
||||
|
|
||||
instance = ec2Resource.Instance(instanceId) |
|
||||
instance.wait_until_running() |
|
||||
|
|
||||
response = ec2Client.associate_address( |
|
||||
AllocationId=firstIpAddressAllocationId, |
|
||||
NetworkInterfaceId=firstNetworkInterfaceId, |
|
||||
) |
|
||||
response = ec2Client.associate_address( |
|
||||
AllocationId=secondIpAddressAllocationId, |
|
||||
NetworkInterfaceId=secondNetworkInterfaceId, |
|
||||
) |
|
||||
|
|
||||
|
|
||||
print(instanceId) |
|
||||
|
|
Before Width: 2046 | Height: 2046 | Size: 299 KiB After Width: 2046 | Height: 2046 | Size: 299 KiB |
1090
example-projects/counter-demo/aws-cloudformation/cloudcomp-counter-demo-with-vpc.json
File diff suppressed because it is too large
View File
File diff suppressed because it is too large
View File
@ -1,394 +1,394 @@ |
|||||
{ |
|
||||
"AWSTemplateFormatVersion": "2010-09-09", |
|
||||
"Parameters": { |
|
||||
"paramImageID": { |
|
||||
"Type": "AWS::EC2::Image::Id", |
|
||||
"Default": "ami-f573e19a", |
|
||||
"Description": "Amazon Image ID" |
|
||||
}, |
|
||||
"paramInstanceType": { |
|
||||
"Type": "String", |
|
||||
"Default": "t2.nano", |
|
||||
"AllowedValues": [ |
|
||||
"t2.nano", |
|
||||
"t2.micro", |
|
||||
"m1.small" |
|
||||
], |
|
||||
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." |
|
||||
}, |
|
||||
"paramKeyPair": { |
|
||||
"Type": "AWS::EC2::KeyPair::KeyName", |
|
||||
"Description": "Amazon EC2 Key Pair" |
|
||||
}, |
|
||||
"paramIamInstanceRole": { |
|
||||
"Type": "String", |
|
||||
"Default": "ec2-s3-vertsys-access-role", |
|
||||
"Description": "IAM Instance Role" |
|
||||
}, |
|
||||
"paramVPC": { |
|
||||
"Type": "AWS::EC2::VPC::Id", |
|
||||
"Description": "VPC" |
|
||||
}, |
|
||||
"paramSubnetIDs": { |
|
||||
"Type": "List<AWS::EC2::Subnet::Id>", |
|
||||
"Description": "Subnet IDs" |
|
||||
}, |
|
||||
"paramAvailabilityZones": { |
|
||||
"Type": "List<AWS::EC2::AvailabilityZone::Name>", |
|
||||
"Description": "AvailabilityZones" |
|
||||
} |
|
||||
}, |
|
||||
"Resources": { |
|
||||
"lcVertSysAutoScaleConfigv11": { |
|
||||
"Type": "AWS::AutoScaling::LaunchConfiguration", |
|
||||
"Properties": { |
|
||||
"AssociatePublicIpAddress": true, |
|
||||
"ImageId": { |
|
||||
"Ref": "paramImageID" |
|
||||
}, |
|
||||
"InstanceType": { |
|
||||
"Ref": "paramInstanceType" |
|
||||
}, |
|
||||
"KeyName": { |
|
||||
"Ref": "paramKeyPair" |
|
||||
}, |
|
||||
"IamInstanceProfile": { |
|
||||
"Ref": "paramIamInstanceRole" |
|
||||
}, |
|
||||
"SecurityGroups": [ |
|
||||
{ |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
} |
|
||||
], |
|
||||
"UserData": { |
|
||||
"Fn::Base64": { |
|
||||
"Fn::Join": [ |
|
||||
"", |
|
||||
[ |
|
||||
"#!/bin/bash\n", |
|
||||
"\n", |
|
||||
"# this script will be run during the boot process by each VertSys instance created\n", |
|
||||
"# in AWS currently this is a plain bash script that requires a RedHat based image\n", |
|
||||
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", |
|
||||
"# distros\n", |
|
||||
"#\n", |
|
||||
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", |
|
||||
"\n", |
|
||||
"# Config\n", |
|
||||
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", |
|
||||
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", |
|
||||
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", |
|
||||
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", |
|
||||
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", |
|
||||
"\n", |
|
||||
"# Create path to run the script\n", |
|
||||
"mkdir $SCRIPT_ROOT_PATH\n", |
|
||||
"cd $SCRIPT_ROOT_PATH\n", |
|
||||
"\n", |
|
||||
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", |
|
||||
"wget http://169.254.169.254/latest/user-data\n", |
|
||||
"chmod +x user-data\n", |
|
||||
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", |
|
||||
"\n", |
|
||||
"# setting console prompt to include location (availability zone and region in AWS)\n", |
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", |
|
||||
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", |
|
||||
"\n", |
|
||||
"# wait for internet connection, should not be necessary, but just in case ;)\n", |
|
||||
"while ! ping -c 1 -W 1 8.8.8.8; do\n", |
|
||||
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", |
|
||||
" sleep 1\n", |
|
||||
"done\n", |
|
||||
"\n", |
|
||||
"# installation of required packages\n", |
|
||||
"echo \"Installing packages...\"\n", |
|
||||
"sudo yum update -y\n", |
|
||||
"sudo yum install -y java git\n", |
|
||||
"#rm -rf verteilte-systeme-bsc-ai-examples\n", |
|
||||
"if [ ! -d $VERTSYS_PATH ]; then\n", |
|
||||
" echo \"Cloning repo...\"\n", |
|
||||
" git clone $REPO\n", |
|
||||
"fi\n", |
|
||||
"\n", |
|
||||
"# killall running screens, .e.g to cleanup if script is run again after boot\n", |
|
||||
"killall screen\n", |
|
||||
"# start all jars\n", |
|
||||
"echo \"Starting JARS: ${JARS}...\"\n", |
|
||||
"for JAR in $JARS; do\n", |
|
||||
" echo \"Starting ${JAR}...\"\n", |
|
||||
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", |
|
||||
"done\n", |
|
||||
"\n", |
|
||||
"# wait a second, to allow java services to start\n", |
|
||||
"sleep 1\n", |
|
||||
"\n", |
|
||||
"# output status of ports 36000-36199 and all running processes\n", |
|
||||
"echo \"Status:\"\n", |
|
||||
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", |
|
||||
"sudo ps aux | grep java\n", |
|
||||
"\n", |
|
||||
"# Example for path and contents:\n", |
|
||||
"#\n", |
|
||||
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", |
|
||||
"#\n", |
|
||||
"#build-server-jars.xml TCPServerMulti.jar\n", |
|
||||
"#RMIEchoServer.jar UDPServer.jar\n", |
|
||||
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", |
|
||||
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n", |
|
||||
"#TCPServer.jar\n" |
|
||||
] |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"sgCloudCompDemoSecurityGroup": { |
|
||||
"Type": "AWS::EC2::SecurityGroup", |
|
||||
"Properties": { |
|
||||
"GroupDescription": "CloudComp Counter Demo", |
|
||||
"VpcId": { |
|
||||
"Ref": "paramVPC" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"ingress1": { |
|
||||
"Type": "AWS::EC2::SecurityGroupIngress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "tcp", |
|
||||
"FromPort": "36037", |
|
||||
"ToPort": "36137", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"ingress2": { |
|
||||
"Type": "AWS::EC2::SecurityGroupIngress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "tcp", |
|
||||
"FromPort": "22", |
|
||||
"ToPort": "22", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"ingress3": { |
|
||||
"Type": "AWS::EC2::SecurityGroupIngress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "udp", |
|
||||
"FromPort": "36037", |
|
||||
"ToPort": "36137", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"egress1": { |
|
||||
"Type": "AWS::EC2::SecurityGroupEgress", |
|
||||
"Properties": { |
|
||||
"GroupId": { |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
}, |
|
||||
"IpProtocol": "-1", |
|
||||
"CidrIp": "0.0.0.0/0" |
|
||||
} |
|
||||
}, |
|
||||
"asgCloudCompAutoScaleGroup": { |
|
||||
"Type": "AWS::AutoScaling::AutoScalingGroup", |
|
||||
"Properties": { |
|
||||
"AvailabilityZones": { |
|
||||
"Ref": "paramAvailabilityZones" |
|
||||
}, |
|
||||
"TargetGroupARNs": [ |
|
||||
{ |
|
||||
"Ref": "elbCloudCompTargetGroup" |
|
||||
} |
|
||||
], |
|
||||
"Cooldown": "30", |
|
||||
"DesiredCapacity": "1", |
|
||||
"HealthCheckGracePeriod": "60", |
|
||||
"HealthCheckType": "EC2", |
|
||||
"MaxSize": "3", |
|
||||
"MinSize": "1", |
|
||||
"VPCZoneIdentifier": { |
|
||||
"Ref": "paramSubnetIDs" |
|
||||
}, |
|
||||
"LaunchConfigurationName": { |
|
||||
"Ref": "lcVertSysAutoScaleConfigv11" |
|
||||
}, |
|
||||
"MetricsCollection": [ |
|
||||
{ |
|
||||
"Granularity": "1Minute", |
|
||||
"Metrics": [ |
|
||||
"GroupPendingInstances", |
|
||||
"GroupMinSize", |
|
||||
"GroupDesiredCapacity", |
|
||||
"GroupTerminatingInstances", |
|
||||
"GroupInServiceInstances", |
|
||||
"GroupStandbyInstances", |
|
||||
"GroupMaxSize", |
|
||||
"GroupTotalInstances" |
|
||||
] |
|
||||
} |
|
||||
], |
|
||||
"TerminationPolicies": [ |
|
||||
"Default" |
|
||||
] |
|
||||
} |
|
||||
}, |
|
||||
"sgCloudCompScalePolicy": { |
|
||||
"Type": "AWS::AutoScaling::ScalingPolicy", |
|
||||
"DependsOn": "elbCloudCompListener", |
|
||||
"Properties": { |
|
||||
"PolicyType": "TargetTrackingScaling", |
|
||||
"EstimatedInstanceWarmup": 60, |
|
||||
"TargetTrackingConfiguration": { |
|
||||
"DisableScaleIn": false, |
|
||||
"TargetValue": 5, |
|
||||
"PredefinedMetricSpecification": { |
|
||||
"PredefinedMetricType": "ALBRequestCountPerTarget", |
|
||||
"ResourceLabel": { |
|
||||
"Fn::Join": [ |
|
||||
"/", |
|
||||
[ |
|
||||
"app/elbCloudCompLoadBalancer", |
|
||||
{ |
|
||||
"Fn::Select": [ |
|
||||
"3", |
|
||||
{ |
|
||||
"Fn::Split": [ |
|
||||
"/", |
|
||||
{ |
|
||||
"Ref": "elbCloudCompLoadBalancer" |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
] |
|
||||
}, |
|
||||
"targetgroup/elbCloudCompTargetGroup", |
|
||||
{ |
|
||||
"Fn::Select": [ |
|
||||
"2", |
|
||||
{ |
|
||||
"Fn::Split": [ |
|
||||
"/", |
|
||||
{ |
|
||||
"Ref": "elbCloudCompTargetGroup" |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
] |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"AutoScalingGroupName": { |
|
||||
"Ref": "asgCloudCompAutoScaleGroup" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"elbCloudCompLoadBalancer": { |
|
||||
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", |
|
||||
"Properties": { |
|
||||
"Name": "elbCloudCompLoadBalancer", |
|
||||
"IpAddressType": "ipv4", |
|
||||
"Type": "application", |
|
||||
"Scheme": "internet-facing", |
|
||||
"SecurityGroups": [ |
|
||||
{ |
|
||||
"Ref": "sgCloudCompDemoSecurityGroup" |
|
||||
} |
|
||||
], |
|
||||
"Subnets": { |
|
||||
"Ref": "paramSubnetIDs" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"elbCloudCompTargetGroup": { |
|
||||
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup", |
|
||||
"Properties": { |
|
||||
"Port": 36042, |
|
||||
"HealthCheckIntervalSeconds": 30, |
|
||||
"HealthCheckTimeoutSeconds": 5, |
|
||||
"HealthyThresholdCount": 2, |
|
||||
"UnhealthyThresholdCount": 2, |
|
||||
"HealthCheckPath": "/counter", |
|
||||
"HealthCheckProtocol": "HTTP", |
|
||||
"TargetGroupAttributes": [ |
|
||||
{ |
|
||||
"Key": "deregistration_delay.timeout_seconds", |
|
||||
"Value": "20" |
|
||||
} |
|
||||
], |
|
||||
"Protocol": "HTTP", |
|
||||
"TargetType": "instance", |
|
||||
"Matcher": { |
|
||||
"HttpCode": "200" |
|
||||
}, |
|
||||
"Name": "elbCloudCompTargetGroup", |
|
||||
"VpcId": { |
|
||||
"Ref": "paramVPC" |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"elbCloudCompListener": { |
|
||||
"Type": "AWS::ElasticLoadBalancingV2::Listener", |
|
||||
"Properties": { |
|
||||
"LoadBalancerArn": { |
|
||||
"Ref": "elbCloudCompLoadBalancer" |
|
||||
}, |
|
||||
"Protocol": "HTTP", |
|
||||
"Port": 36042, |
|
||||
"DefaultActions": [ |
|
||||
{ |
|
||||
"Type": "forward", |
|
||||
"TargetGroupArn": { |
|
||||
"Ref": "elbCloudCompTargetGroup" |
|
||||
} |
|
||||
} |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"Outputs": { |
|
||||
"LoadBalancer": { |
|
||||
"Description": "Load Balancer", |
|
||||
"Value": { |
|
||||
"Ref": "elbCloudCompLoadBalancer" |
|
||||
} |
|
||||
}, |
|
||||
"LoadBalancerDns": { |
|
||||
"Description": "Load Balancer DNS", |
|
||||
"Value": { |
|
||||
"Fn::GetAtt": [ |
|
||||
"elbCloudCompLoadBalancer", |
|
||||
"DNSName" |
|
||||
] |
|
||||
} |
|
||||
}, |
|
||||
"LoadBalancerURL": { |
|
||||
"Description": "Load Balancer URL", |
|
||||
"Value": { |
|
||||
"Fn::Join": [ |
|
||||
":", |
|
||||
[ |
|
||||
{ |
|
||||
"Fn::GetAtt": [ |
|
||||
"elbCloudCompLoadBalancer", |
|
||||
"DNSName" |
|
||||
] |
|
||||
}, |
|
||||
"36042/counter" |
|
||||
] |
|
||||
] |
|
||||
} |
|
||||
} |
|
||||
}, |
|
||||
"Description": "CloudComp Counter Demo" |
|
||||
|
{ |
||||
|
"AWSTemplateFormatVersion": "2010-09-09", |
||||
|
"Parameters": { |
||||
|
"paramImageID": { |
||||
|
"Type": "AWS::EC2::Image::Id", |
||||
|
"Default": "ami-f573e19a", |
||||
|
"Description": "Amazon Image ID" |
||||
|
}, |
||||
|
"paramInstanceType": { |
||||
|
"Type": "String", |
||||
|
"Default": "t2.nano", |
||||
|
"AllowedValues": [ |
||||
|
"t2.nano", |
||||
|
"t2.micro", |
||||
|
"m1.small" |
||||
|
], |
||||
|
"Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." |
||||
|
}, |
||||
|
"paramKeyPair": { |
||||
|
"Type": "AWS::EC2::KeyPair::KeyName", |
||||
|
"Description": "Amazon EC2 Key Pair" |
||||
|
}, |
||||
|
"paramIamInstanceRole": { |
||||
|
"Type": "String", |
||||
|
"Default": "ec2-s3-vertsys-access-role", |
||||
|
"Description": "IAM Instance Role" |
||||
|
}, |
||||
|
"paramVPC": { |
||||
|
"Type": "AWS::EC2::VPC::Id", |
||||
|
"Description": "VPC" |
||||
|
}, |
||||
|
"paramSubnetIDs": { |
||||
|
"Type": "List<AWS::EC2::Subnet::Id>", |
||||
|
"Description": "Subnet IDs" |
||||
|
}, |
||||
|
"paramAvailabilityZones": { |
||||
|
"Type": "List<AWS::EC2::AvailabilityZone::Name>", |
||||
|
"Description": "AvailabilityZones" |
||||
|
} |
||||
|
}, |
||||
|
"Resources": { |
||||
|
"lcVertSysAutoScaleConfigv11": { |
||||
|
"Type": "AWS::AutoScaling::LaunchConfiguration", |
||||
|
"Properties": { |
||||
|
"AssociatePublicIpAddress": true, |
||||
|
"ImageId": { |
||||
|
"Ref": "paramImageID" |
||||
|
}, |
||||
|
"InstanceType": { |
||||
|
"Ref": "paramInstanceType" |
||||
|
}, |
||||
|
"KeyName": { |
||||
|
"Ref": "paramKeyPair" |
||||
|
}, |
||||
|
"IamInstanceProfile": { |
||||
|
"Ref": "paramIamInstanceRole" |
||||
|
}, |
||||
|
"SecurityGroups": [ |
||||
|
{ |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
} |
||||
|
], |
||||
|
"UserData": { |
||||
|
"Fn::Base64": { |
||||
|
"Fn::Join": [ |
||||
|
"", |
||||
|
[ |
||||
|
"#!/bin/bash\n", |
||||
|
"\n", |
||||
|
"# this script will be run during the boot process by each VertSys instance created\n", |
||||
|
"# in AWS currently this is a plain bash script that requires a RedHat based image\n", |
||||
|
"# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", |
||||
|
"# distros\n", |
||||
|
"#\n", |
||||
|
"# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", |
||||
|
"\n", |
||||
|
"# Config\n", |
||||
|
"SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", |
||||
|
"VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", |
||||
|
"#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", |
||||
|
"JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", |
||||
|
"REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", |
||||
|
"\n", |
||||
|
"# Create path to run the script\n", |
||||
|
"mkdir $SCRIPT_ROOT_PATH\n", |
||||
|
"cd $SCRIPT_ROOT_PATH\n", |
||||
|
"\n", |
||||
|
"# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", |
||||
|
"wget http://169.254.169.254/latest/user-data\n", |
||||
|
"chmod +x user-data\n", |
||||
|
"wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", |
||||
|
"\n", |
||||
|
"# setting console prompt to include location (availability zone and region in AWS)\n", |
||||
|
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", |
||||
|
"echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", |
||||
|
"\n", |
||||
|
"# wait for internet connection, should not be necessary, but just in case ;)\n", |
||||
|
"while ! ping -c 1 -W 1 8.8.8.8; do\n", |
||||
|
" echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", |
||||
|
" sleep 1\n", |
||||
|
"done\n", |
||||
|
"\n", |
||||
|
"# installation of required packages\n", |
||||
|
"echo \"Installing packages...\"\n", |
||||
|
"sudo yum update -y\n", |
||||
|
"sudo yum install -y java git\n", |
||||
|
"#rm -rf verteilte-systeme-bsc-ai-examples\n", |
||||
|
"if [ ! -d $VERTSYS_PATH ]; then\n", |
||||
|
" echo \"Cloning repo...\"\n", |
||||
|
" git clone $REPO\n", |
||||
|
"fi\n", |
||||
|
"\n", |
||||
|
"# killall running screens, .e.g to cleanup if script is run again after boot\n", |
||||
|
"killall screen\n", |
||||
|
"# start all jars\n", |
||||
|
"echo \"Starting JARS: ${JARS}...\"\n", |
||||
|
"for JAR in $JARS; do\n", |
||||
|
" echo \"Starting ${JAR}...\"\n", |
||||
|
" sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", |
||||
|
"done\n", |
||||
|
"\n", |
||||
|
"# wait a second, to allow java services to start\n", |
||||
|
"sleep 1\n", |
||||
|
"\n", |
||||
|
"# output status of ports 36000-36199 and all running processes\n", |
||||
|
"echo \"Status:\"\n", |
||||
|
"sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", |
||||
|
"sudo ps aux | grep java\n", |
||||
|
"\n", |
||||
|
"# Example for path and contents:\n", |
||||
|
"#\n", |
||||
|
"# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", |
||||
|
"#\n", |
||||
|
"#build-server-jars.xml TCPServerMulti.jar\n", |
||||
|
"#RMIEchoServer.jar UDPServer.jar\n", |
||||
|
"#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", |
||||
|
"#TCPPerfServer.jar UDPTimeCounterServer.jar\n", |
||||
|
"#TCPServer.jar\n" |
||||
|
] |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"sgCloudCompDemoSecurityGroup": { |
||||
|
"Type": "AWS::EC2::SecurityGroup", |
||||
|
"Properties": { |
||||
|
"GroupDescription": "CloudComp Counter Demo", |
||||
|
"VpcId": { |
||||
|
"Ref": "paramVPC" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"ingress1": { |
||||
|
"Type": "AWS::EC2::SecurityGroupIngress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "tcp", |
||||
|
"FromPort": "36037", |
||||
|
"ToPort": "36137", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"ingress2": { |
||||
|
"Type": "AWS::EC2::SecurityGroupIngress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "tcp", |
||||
|
"FromPort": "22", |
||||
|
"ToPort": "22", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"ingress3": { |
||||
|
"Type": "AWS::EC2::SecurityGroupIngress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "udp", |
||||
|
"FromPort": "36037", |
||||
|
"ToPort": "36137", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"egress1": { |
||||
|
"Type": "AWS::EC2::SecurityGroupEgress", |
||||
|
"Properties": { |
||||
|
"GroupId": { |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
}, |
||||
|
"IpProtocol": "-1", |
||||
|
"CidrIp": "0.0.0.0/0" |
||||
|
} |
||||
|
}, |
||||
|
"asgCloudCompAutoScaleGroup": { |
||||
|
"Type": "AWS::AutoScaling::AutoScalingGroup", |
||||
|
"Properties": { |
||||
|
"AvailabilityZones": { |
||||
|
"Ref": "paramAvailabilityZones" |
||||
|
}, |
||||
|
"TargetGroupARNs": [ |
||||
|
{ |
||||
|
"Ref": "elbCloudCompTargetGroup" |
||||
|
} |
||||
|
], |
||||
|
"Cooldown": "30", |
||||
|
"DesiredCapacity": "1", |
||||
|
"HealthCheckGracePeriod": "60", |
||||
|
"HealthCheckType": "EC2", |
||||
|
"MaxSize": "3", |
||||
|
"MinSize": "1", |
||||
|
"VPCZoneIdentifier": { |
||||
|
"Ref": "paramSubnetIDs" |
||||
|
}, |
||||
|
"LaunchConfigurationName": { |
||||
|
"Ref": "lcVertSysAutoScaleConfigv11" |
||||
|
}, |
||||
|
"MetricsCollection": [ |
||||
|
{ |
||||
|
"Granularity": "1Minute", |
||||
|
"Metrics": [ |
||||
|
"GroupPendingInstances", |
||||
|
"GroupMinSize", |
||||
|
"GroupDesiredCapacity", |
||||
|
"GroupTerminatingInstances", |
||||
|
"GroupInServiceInstances", |
||||
|
"GroupStandbyInstances", |
||||
|
"GroupMaxSize", |
||||
|
"GroupTotalInstances" |
||||
|
] |
||||
|
} |
||||
|
], |
||||
|
"TerminationPolicies": [ |
||||
|
"Default" |
||||
|
] |
||||
|
} |
||||
|
}, |
||||
|
"sgCloudCompScalePolicy": { |
||||
|
"Type": "AWS::AutoScaling::ScalingPolicy", |
||||
|
"DependsOn": "elbCloudCompListener", |
||||
|
"Properties": { |
||||
|
"PolicyType": "TargetTrackingScaling", |
||||
|
"EstimatedInstanceWarmup": 60, |
||||
|
"TargetTrackingConfiguration": { |
||||
|
"DisableScaleIn": false, |
||||
|
"TargetValue": 5, |
||||
|
"PredefinedMetricSpecification": { |
||||
|
"PredefinedMetricType": "ALBRequestCountPerTarget", |
||||
|
"ResourceLabel": { |
||||
|
"Fn::Join": [ |
||||
|
"/", |
||||
|
[ |
||||
|
"app/elbCloudCompLoadBalancer", |
||||
|
{ |
||||
|
"Fn::Select": [ |
||||
|
"3", |
||||
|
{ |
||||
|
"Fn::Split": [ |
||||
|
"/", |
||||
|
{ |
||||
|
"Ref": "elbCloudCompLoadBalancer" |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
] |
||||
|
}, |
||||
|
"targetgroup/elbCloudCompTargetGroup", |
||||
|
{ |
||||
|
"Fn::Select": [ |
||||
|
"2", |
||||
|
{ |
||||
|
"Fn::Split": [ |
||||
|
"/", |
||||
|
{ |
||||
|
"Ref": "elbCloudCompTargetGroup" |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
] |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"AutoScalingGroupName": { |
||||
|
"Ref": "asgCloudCompAutoScaleGroup" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"elbCloudCompLoadBalancer": { |
||||
|
"Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", |
||||
|
"Properties": { |
||||
|
"Name": "elbCloudCompLoadBalancer", |
||||
|
"IpAddressType": "ipv4", |
||||
|
"Type": "application", |
||||
|
"Scheme": "internet-facing", |
||||
|
"SecurityGroups": [ |
||||
|
{ |
||||
|
"Ref": "sgCloudCompDemoSecurityGroup" |
||||
|
} |
||||
|
], |
||||
|
"Subnets": { |
||||
|
"Ref": "paramSubnetIDs" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"elbCloudCompTargetGroup": { |
||||
|
"Type": "AWS::ElasticLoadBalancingV2::TargetGroup", |
||||
|
"Properties": { |
||||
|
"Port": 36042, |
||||
|
"HealthCheckIntervalSeconds": 30, |
||||
|
"HealthCheckTimeoutSeconds": 5, |
||||
|
"HealthyThresholdCount": 2, |
||||
|
"UnhealthyThresholdCount": 2, |
||||
|
"HealthCheckPath": "/counter", |
||||
|
"HealthCheckProtocol": "HTTP", |
||||
|
"TargetGroupAttributes": [ |
||||
|
{ |
||||
|
"Key": "deregistration_delay.timeout_seconds", |
||||
|
"Value": "20" |
||||
|
} |
||||
|
], |
||||
|
"Protocol": "HTTP", |
||||
|
"TargetType": "instance", |
||||
|
"Matcher": { |
||||
|
"HttpCode": "200" |
||||
|
}, |
||||
|
"Name": "elbCloudCompTargetGroup", |
||||
|
"VpcId": { |
||||
|
"Ref": "paramVPC" |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"elbCloudCompListener": { |
||||
|
"Type": "AWS::ElasticLoadBalancingV2::Listener", |
||||
|
"Properties": { |
||||
|
"LoadBalancerArn": { |
||||
|
"Ref": "elbCloudCompLoadBalancer" |
||||
|
}, |
||||
|
"Protocol": "HTTP", |
||||
|
"Port": 36042, |
||||
|
"DefaultActions": [ |
||||
|
{ |
||||
|
"Type": "forward", |
||||
|
"TargetGroupArn": { |
||||
|
"Ref": "elbCloudCompTargetGroup" |
||||
|
} |
||||
|
} |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"Outputs": { |
||||
|
"LoadBalancer": { |
||||
|
"Description": "Load Balancer", |
||||
|
"Value": { |
||||
|
"Ref": "elbCloudCompLoadBalancer" |
||||
|
} |
||||
|
}, |
||||
|
"LoadBalancerDns": { |
||||
|
"Description": "Load Balancer DNS", |
||||
|
"Value": { |
||||
|
"Fn::GetAtt": [ |
||||
|
"elbCloudCompLoadBalancer", |
||||
|
"DNSName" |
||||
|
] |
||||
|
} |
||||
|
}, |
||||
|
"LoadBalancerURL": { |
||||
|
"Description": "Load Balancer URL", |
||||
|
"Value": { |
||||
|
"Fn::Join": [ |
||||
|
":", |
||||
|
[ |
||||
|
{ |
||||
|
"Fn::GetAtt": [ |
||||
|
"elbCloudCompLoadBalancer", |
||||
|
"DNSName" |
||||
|
] |
||||
|
}, |
||||
|
"36042/counter" |
||||
|
] |
||||
|
] |
||||
|
} |
||||
|
} |
||||
|
}, |
||||
|
"Description": "CloudComp Counter Demo" |
||||
} |
} |
@ -0,0 +1,184 @@ |
|||||
|
import boto3 |
||||
|
from botocore.exceptions import ClientError |
||||
|
|
||||
|
region = 'eu-central-1' |
||||
|
availabilityZone = 'eu-central-1b' |
||||
|
imageId = 'ami-0cc293023f983ed53' |
||||
|
instanceType = 't3.nano' |
||||
|
keyName = 'srieger-pub' |
||||
|
userDataDB = ('#!/bin/bash\n' |
||||
|
'#!/bin/bash\n' |
||||
|
'# extra repo for RedHat rpms\n' |
||||
|
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' |
||||
|
'# essential tools\n' |
||||
|
'yum install -y joe htop git\n' |
||||
|
'# mysql\n' |
||||
|
'yum install -y mariadb mariadb-server\n' |
||||
|
'\n' |
||||
|
'service mariadb start\n' |
||||
|
'\n' |
||||
|
'echo "create database cloud_tug_of_war" | mysql -u root\n' |
||||
|
'\n' |
||||
|
'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n' |
||||
|
'\n' |
||||
|
'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloud\';" | mysql -u root\n' |
||||
|
'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n' |
||||
|
'echo "FLUSH PRIVILEGES" | mysql -u root\n' |
||||
|
) |
||||
|
|
||||
|
# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/" |
||||
|
|
||||
|
client = boto3.setup_default_session(region_name=region) |
||||
|
ec2Client = boto3.client("ec2") |
||||
|
ec2Resource = boto3.resource('ec2') |
||||
|
|
||||
|
response = ec2Client.describe_vpcs() |
||||
|
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') |
||||
|
subnet_id = ec2Client.describe_subnets( |
||||
|
Filters=[ |
||||
|
{ |
||||
|
'Name': 'availability-zone', 'Values': [availabilityZone] |
||||
|
} |
||||
|
])['Subnets'][0]['SubnetId'] |
||||
|
|
||||
|
print("Deleting old instance...") |
||||
|
print("------------------------------------") |
||||
|
|
||||
|
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}]) |
||||
|
print(response) |
||||
|
reservations = response['Reservations'] |
||||
|
for reservation in reservations: |
||||
|
for instance in reservation['Instances']: |
||||
|
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending": |
||||
|
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']]) |
||||
|
print(response) |
||||
|
instanceToTerminate = ec2Resource.Instance(instance['InstanceId']) |
||||
|
instanceToTerminate.wait_until_terminated() |
||||
|
|
||||
|
print("Delete old security group...") |
||||
|
print("------------------------------------") |
||||
|
|
||||
|
try: |
||||
|
response = ec2Client.delete_security_group(GroupName='tug-of-war') |
||||
|
except ClientError as e: |
||||
|
print(e) |
||||
|
|
||||
|
print("Create security group...") |
||||
|
print("------------------------------------") |
||||
|
|
||||
|
try: |
||||
|
response = ec2Client.create_security_group(GroupName='tug-of-war', |
||||
|
Description='tug-of-war', |
||||
|
VpcId=vpc_id) |
||||
|
security_group_id = response['GroupId'] |
||||
|
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id)) |
||||
|
|
||||
|
data = ec2Client.authorize_security_group_ingress( |
||||
|
GroupId=security_group_id, |
||||
|
IpPermissions=[ |
||||
|
{'IpProtocol': 'tcp', |
||||
|
'FromPort': 3306, |
||||
|
'ToPort': 3306, |
||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
||||
|
{'IpProtocol': 'tcp', |
||||
|
'FromPort': 22, |
||||
|
'ToPort': 22, |
||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
||||
|
{'IpProtocol': 'tcp', |
||||
|
'FromPort': 80, |
||||
|
'ToPort': 80, |
||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
||||
|
{'IpProtocol': 'tcp', |
||||
|
'FromPort': 443, |
||||
|
'ToPort': 443, |
||||
|
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]} |
||||
|
]) |
||||
|
print('Ingress Successfully Set %s' % data) |
||||
|
except ClientError as e: |
||||
|
print(e) |
||||
|
|
||||
|
print("Running new DB instance...") |
||||
|
print("------------------------------------") |
||||
|
|
||||
|
response = ec2Client.run_instances( |
||||
|
ImageId=imageId, |
||||
|
InstanceType=instanceType, |
||||
|
Placement={'AvailabilityZone': availabilityZone, }, |
||||
|
KeyName=keyName, |
||||
|
MinCount=1, |
||||
|
MaxCount=1, |
||||
|
UserData=userDataDB, |
||||
|
SecurityGroupIds=[ |
||||
|
security_group_id, |
||||
|
], |
||||
|
TagSpecifications=[ |
||||
|
{ |
||||
|
'ResourceType': 'instance', |
||||
|
'Tags': [ |
||||
|
{'Key': 'Name', 'Value': 'tug-of-war-db1'}, |
||||
|
{'Key': 'tug-of-war', 'Value': 'installed'} |
||||
|
], |
||||
|
} |
||||
|
], |
||||
|
) |
||||
|
|
||||
|
instanceIdDB = response['Instances'][0]['InstanceId'] |
||||
|
privateIpDB = response['Instances'][0]['PrivateIpAddress'] |
||||
|
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] |
||||
|
|
||||
|
instance = ec2Resource.Instance(instanceIdDB) |
||||
|
instance.wait_until_running() |
||||
|
|
||||
|
print(instanceIdDB) |
||||
|
|
||||
|
userDataWebServer = ('#!/bin/bash\n' |
||||
|
'# extra repo for RedHat rpms\n' |
||||
|
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' |
||||
|
'# essential tools\n' |
||||
|
'yum install -y joe htop git\n' |
||||
|
'# mysql\n' |
||||
|
'yum install -y httpd php php-mysql\n' |
||||
|
'\n' |
||||
|
'service httpd start\n' |
||||
|
'\n' |
||||
|
'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n' |
||||
|
'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n' |
||||
|
'cd /var/www/html\n' |
||||
|
'tar zxvf tug-of-war-in-the-clouds.tar.gz\n' |
||||
|
'\n' |
||||
|
'# change hostname of db connection\n' |
||||
|
'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n' |
||||
|
) |
||||
|
|
||||
|
print("Running new Web Server instance...") |
||||
|
print("------------------------------------") |
||||
|
|
||||
|
response = ec2Client.run_instances( |
||||
|
ImageId=imageId, |
||||
|
InstanceType=instanceType, |
||||
|
Placement={'AvailabilityZone': availabilityZone, }, |
||||
|
KeyName=keyName, |
||||
|
MinCount=1, |
||||
|
MaxCount=1, |
||||
|
UserData=userDataWebServer, |
||||
|
SecurityGroupIds=[ |
||||
|
security_group_id, |
||||
|
], |
||||
|
|
||||
|
TagSpecifications=[ |
||||
|
{ |
||||
|
'ResourceType': 'instance', |
||||
|
'Tags': [ |
||||
|
{'Key': 'Name', 'Value': 'tug-of-war-webserver1'}, |
||||
|
{'Key': 'tug-of-war', 'Value': 'installed'} |
||||
|
], |
||||
|
} |
||||
|
], |
||||
|
) |
||||
|
|
||||
|
instanceIdDB = response['Instances'][0]['InstanceId'] |
||||
|
privateIpDB = response['Instances'][0]['PrivateIpAddress'] |
||||
|
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] |
||||
|
|
||||
|
instance = ec2Resource.Instance(instanceIdDB) |
||||
|
instance.wait_until_running() |
Write
Preview
Loading…
Cancel
Save
Reference in new issue