Sebastian Rieger
6 years ago
1 changed files with 305 additions and 0 deletions
@ -0,0 +1,305 @@ |
|||
import time |
|||
|
|||
import boto3 |
|||
from botocore.exceptions import ClientError |
|||
|
|||
region = 'eu-central-1' |
|||
availabilityZone = 'eu-central-1b' |
|||
imageId = 'ami-0cc293023f983ed53' |
|||
instanceType = 't3.nano' |
|||
keyName = 'srieger-pub' |
|||
subnet1 = 'subnet-41422b28' |
|||
subnet2 = 'subnet-5c5f6d16' |
|||
subnet3 = 'subnet-6f2ea214' |
|||
|
|||
userDataDB = ('#!/bin/bash\n' |
|||
'#!/bin/bash\n' |
|||
'# extra repo for RedHat rpms\n' |
|||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' |
|||
'# essential tools\n' |
|||
'yum install -y joe htop git\n' |
|||
'# mysql\n' |
|||
'yum install -y mariadb mariadb-server\n' |
|||
'\n' |
|||
'service mariadb start\n' |
|||
'\n' |
|||
'echo "create database cloud_tug_of_war" | mysql -u root\n' |
|||
'\n' |
|||
'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n' |
|||
'\n' |
|||
'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloudpass\';" | mysql -u root\n' |
|||
'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n' |
|||
'echo "FLUSH PRIVILEGES" | mysql -u root\n' |
|||
) |
|||
|
|||
# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/" |
|||
|
|||
client = boto3.setup_default_session(region_name=region) |
|||
ec2Client = boto3.client("ec2") |
|||
ec2Resource = boto3.resource('ec2') |
|||
|
|||
response = ec2Client.describe_vpcs() |
|||
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') |
|||
|
|||
elbv2Client = boto3.client('elbv2') |
|||
asClient = boto3.client('autoscaling') |
|||
|
|||
print("Deleting auto scaling group...") |
|||
print("------------------------------------") |
|||
|
|||
try: |
|||
response = asClient.delete_auto_scaling_group(AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', ForceDelete=True) |
|||
except ClientError as e: |
|||
print(e) |
|||
|
|||
print("Deleting launch configuration...") |
|||
print("------------------------------------") |
|||
|
|||
try: |
|||
response = asClient.delete_launch_configuration(LaunchConfigurationName='tug-of-war-asg-launchconfig') |
|||
except ClientError as e: |
|||
print(e) |
|||
|
|||
|
|||
|
|||
print("Deleting old instances...") |
|||
print("------------------------------------") |
|||
|
|||
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war-asg']}]) |
|||
print(response) |
|||
reservations = response['Reservations'] |
|||
for reservation in reservations: |
|||
for instance in reservation['Instances']: |
|||
if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending": |
|||
response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']]) |
|||
print(response) |
|||
instanceToTerminate = ec2Resource.Instance(instance['InstanceId']) |
|||
instanceToTerminate.wait_until_terminated() |
|||
|
|||
|
|||
print("Deleting load balancer and deps...") |
|||
print("------------------------------------") |
|||
|
|||
try: |
|||
response = elbv2Client.describe_load_balancers(Names=['tug-of-war-asg-loadbalancer']) |
|||
loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '') |
|||
response = elbv2Client.delete_load_balancer(LoadBalancerArn=loadbalancer_arn) |
|||
except ClientError as e: |
|||
print(e) |
|||
|
|||
time.sleep(5) |
|||
|
|||
try: |
|||
response = elbv2Client.describe_target_groups(Names=['tug-of-war-asg-targetgroup']) |
|||
targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '') |
|||
response = elbv2Client.delete_target_group(TargetGroupArn=targetgroup_arn) |
|||
except ClientError as e: |
|||
print(e) |
|||
|
|||
|
|||
print("Delete old security group...") |
|||
print("------------------------------------") |
|||
|
|||
try: |
|||
response = ec2Client.delete_security_group(GroupName='tug-of-war-asg') |
|||
except ClientError as e: |
|||
print(e) |
|||
|
|||
print("Create security group...") |
|||
print("------------------------------------") |
|||
|
|||
try: |
|||
response = ec2Client.create_security_group(GroupName='tug-of-war-asg', |
|||
Description='tug-of-war-asg', |
|||
VpcId=vpc_id) |
|||
security_group_id = response['GroupId'] |
|||
print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id)) |
|||
|
|||
data = ec2Client.authorize_security_group_ingress( |
|||
GroupId=security_group_id, |
|||
IpPermissions=[ |
|||
{'IpProtocol': 'tcp', |
|||
'FromPort': 3306, |
|||
'ToPort': 3306, |
|||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|||
{'IpProtocol': 'tcp', |
|||
'FromPort': 22, |
|||
'ToPort': 22, |
|||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|||
{'IpProtocol': 'tcp', |
|||
'FromPort': 80, |
|||
'ToPort': 80, |
|||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, |
|||
{'IpProtocol': 'tcp', |
|||
'FromPort': 443, |
|||
'ToPort': 443, |
|||
'IpRanges': [{'CidrIp': '0.0.0.0/0'}]} |
|||
]) |
|||
print('Ingress Successfully Set %s' % data) |
|||
except ClientError as e: |
|||
print(e) |
|||
|
|||
print("Running new DB instance...") |
|||
print("------------------------------------") |
|||
|
|||
response = ec2Client.run_instances( |
|||
ImageId=imageId, |
|||
InstanceType=instanceType, |
|||
Placement={'AvailabilityZone': availabilityZone, }, |
|||
KeyName=keyName, |
|||
MinCount=1, |
|||
MaxCount=1, |
|||
UserData=userDataDB, |
|||
SecurityGroupIds=[ |
|||
security_group_id, |
|||
], |
|||
TagSpecifications=[ |
|||
{ |
|||
'ResourceType': 'instance', |
|||
'Tags': [ |
|||
{'Key': 'Name', 'Value': 'tug-of-war-asg-db1'}, |
|||
{'Key': 'tug-of-war-asg', 'Value': 'db'} |
|||
], |
|||
} |
|||
], |
|||
) |
|||
|
|||
instanceIdDB = response['Instances'][0]['InstanceId'] |
|||
privateIpDB = response['Instances'][0]['PrivateIpAddress'] |
|||
# privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] |
|||
|
|||
instance = ec2Resource.Instance(instanceIdDB) |
|||
instance.wait_until_running() |
|||
|
|||
print(instanceIdDB) |
|||
|
|||
userDataWebServer = ('#!/bin/bash\n' |
|||
'# extra repo for RedHat rpms\n' |
|||
'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' |
|||
'# essential tools\n' |
|||
'yum install -y joe htop git\n' |
|||
'# mysql\n' |
|||
'yum install -y httpd php php-mysql\n' |
|||
'\n' |
|||
'service httpd start\n' |
|||
'service httpd start\n' |
|||
'\n' |
|||
# 'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n' |
|||
# 'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n' |
|||
# 'tar zxvf tug-of-war-in-the-clouds.tar.gz\n' |
|||
'cd /var/www/html\n' |
|||
'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/index.php\n' |
|||
'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/cloud.php\n' |
|||
'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/config.php\n' |
|||
'\n' |
|||
'# change hostname of db connection\n' |
|||
'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n' |
|||
) |
|||
|
|||
print("Creating launch configuration...") |
|||
print("------------------------------------") |
|||
|
|||
response = asClient.create_launch_configuration( |
|||
#IamInstanceProfile='my-iam-role', |
|||
ImageId=imageId, |
|||
InstanceType=instanceType, |
|||
LaunchConfigurationName='tug-of-war-asg-launchconfig', |
|||
UserData=userDataWebServer, |
|||
KeyName=keyName, |
|||
SecurityGroups=[ |
|||
security_group_id, |
|||
], |
|||
) |
|||
|
|||
elbv2Client = boto3.client('elbv2') |
|||
|
|||
print("Creating load balancer...") |
|||
print("------------------------------------") |
|||
|
|||
response = elbv2Client.create_load_balancer( |
|||
Name='tug-of-war-asg-loadbalancer', |
|||
Subnets=[ |
|||
subnet1, |
|||
subnet2, |
|||
subnet3, |
|||
], |
|||
SecurityGroups=[ |
|||
security_group_id |
|||
] |
|||
) |
|||
|
|||
loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '') |
|||
loadbalancer_dns = response.get('LoadBalancers', [{}])[0].get('DNSName', '') |
|||
|
|||
print("Creating target group...") |
|||
print("------------------------------------") |
|||
|
|||
response = elbv2Client.create_target_group( |
|||
Name='tug-of-war-asg-targetgroup', |
|||
Port=80, |
|||
Protocol='HTTP', |
|||
VpcId=vpc_id, |
|||
) |
|||
|
|||
targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '') |
|||
|
|||
print("Creating listener...") |
|||
print("------------------------------------") |
|||
|
|||
response = elbv2Client.create_listener( |
|||
DefaultActions=[ |
|||
{ |
|||
'TargetGroupArn': targetgroup_arn, |
|||
'Type': 'forward', |
|||
}, |
|||
], |
|||
LoadBalancerArn=loadbalancer_arn, |
|||
Port=80, |
|||
Protocol='HTTP', |
|||
) |
|||
|
|||
response = elbv2Client.modify_target_group_attributes( |
|||
TargetGroupArn=targetgroup_arn, |
|||
Attributes=[ |
|||
{ |
|||
'Key': 'stickiness.enabled', |
|||
'Value': 'true' |
|||
}, |
|||
] |
|||
) |
|||
|
|||
print("Creating auto scaling group...") |
|||
print("------------------------------------") |
|||
|
|||
response = asClient.create_auto_scaling_group( |
|||
AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', |
|||
LaunchConfigurationName='tug-of-war-asg-launchconfig', |
|||
MaxSize=3, |
|||
MinSize=1, |
|||
HealthCheckGracePeriod=120, |
|||
HealthCheckType='ELB', |
|||
TargetGroupARNs=[ |
|||
targetgroup_arn, |
|||
], |
|||
VPCZoneIdentifier=subnet1 + ', ' + ', ' + subnet2 + ', ' + subnet3, |
|||
Tags=[ |
|||
{'Key': 'Name', 'Value': 'tug-of-war-asg-webserver', 'PropagateAtLaunch': True}, |
|||
{'Key': 'tug-of-war', 'Value': 'webserver', 'PropagateAtLaunch': True} |
|||
], |
|||
) |
|||
|
|||
print('app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[2]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[1]+'target-group-id') |
|||
|
|||
response = asClient.put_scaling_policy( |
|||
AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', |
|||
PolicyName='tug-of-war-asg-scalingpolicy', |
|||
PolicyType='TargetTrackingScaling', |
|||
EstimatedInstanceWarmup=30, |
|||
TargetTrackingConfiguration={ |
|||
'PredefinedMetricSpecification': { |
|||
'PredefinedMetricType': 'ALBRequestCountPerTarget', |
|||
'ResourceLabel': 'app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[2]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[1]+'target-group-id' |
|||
}, |
|||
'TargetValue': 5.0, |
|||
} |
|||
) |
Write
Preview
Loading…
Cancel
Save
Reference in new issue