diff --git a/example-projects/tug-of-war-in-the-clouds/aws-boto3-standalone-db-autoscaling/start.py b/example-projects/tug-of-war-in-the-clouds/aws-boto3-standalone-db-autoscaling/start.py new file mode 100644 index 0000000..7c3af6e --- /dev/null +++ b/example-projects/tug-of-war-in-the-clouds/aws-boto3-standalone-db-autoscaling/start.py @@ -0,0 +1,305 @@ +import time + +import boto3 +from botocore.exceptions import ClientError + +region = 'eu-central-1' +availabilityZone = 'eu-central-1b' +imageId = 'ami-0cc293023f983ed53' +instanceType = 't3.nano' +keyName = 'srieger-pub' +subnet1 = 'subnet-41422b28' +subnet2 = 'subnet-5c5f6d16' +subnet3 = 'subnet-6f2ea214' + +userDataDB = ('#!/bin/bash\n' + '#!/bin/bash\n' + '# extra repo for RedHat rpms\n' + 'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' + '# essential tools\n' + 'yum install -y joe htop git\n' + '# mysql\n' + 'yum install -y mariadb mariadb-server\n' + '\n' + 'service mariadb start\n' + '\n' + 'echo "create database cloud_tug_of_war" | mysql -u root\n' + '\n' + 'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n' + '\n' + 'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloudpass\';" | mysql -u root\n' + 'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n' + 'echo "FLUSH PRIVILEGES" | mysql -u root\n' + ) + +# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/" + +client = boto3.setup_default_session(region_name=region) +ec2Client = boto3.client("ec2") +ec2Resource = boto3.resource('ec2') + +response = ec2Client.describe_vpcs() +vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '') + +elbv2Client = boto3.client('elbv2') +asClient = boto3.client('autoscaling') + +print("Deleting auto scaling group...") +print("------------------------------------") + +try: + response = asClient.delete_auto_scaling_group(AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', ForceDelete=True) +except ClientError as e: + print(e) + +print("Deleting launch configuration...") +print("------------------------------------") + +try: + response = asClient.delete_launch_configuration(LaunchConfigurationName='tug-of-war-asg-launchconfig') +except ClientError as e: + print(e) + + + +print("Deleting old instances...") +print("------------------------------------") + +response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war-asg']}]) +print(response) +reservations = response['Reservations'] +for reservation in reservations: + for instance in reservation['Instances']: + if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending": + response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']]) + print(response) + instanceToTerminate = ec2Resource.Instance(instance['InstanceId']) + instanceToTerminate.wait_until_terminated() + + +print("Deleting load balancer and deps...") +print("------------------------------------") + +try: + response = elbv2Client.describe_load_balancers(Names=['tug-of-war-asg-loadbalancer']) + loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '') + response = elbv2Client.delete_load_balancer(LoadBalancerArn=loadbalancer_arn) +except ClientError as e: + print(e) + +time.sleep(5) + +try: + response = elbv2Client.describe_target_groups(Names=['tug-of-war-asg-targetgroup']) + targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '') + response = elbv2Client.delete_target_group(TargetGroupArn=targetgroup_arn) +except ClientError as e: + print(e) + + +print("Delete old security group...") +print("------------------------------------") + +try: + response = ec2Client.delete_security_group(GroupName='tug-of-war-asg') +except ClientError as e: + print(e) + +print("Create security group...") +print("------------------------------------") + +try: + response = ec2Client.create_security_group(GroupName='tug-of-war-asg', + Description='tug-of-war-asg', + VpcId=vpc_id) + security_group_id = response['GroupId'] + print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id)) + + data = ec2Client.authorize_security_group_ingress( + GroupId=security_group_id, + IpPermissions=[ + {'IpProtocol': 'tcp', + 'FromPort': 3306, + 'ToPort': 3306, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, + {'IpProtocol': 'tcp', + 'FromPort': 22, + 'ToPort': 22, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, + {'IpProtocol': 'tcp', + 'FromPort': 80, + 'ToPort': 80, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}, + {'IpProtocol': 'tcp', + 'FromPort': 443, + 'ToPort': 443, + 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]} + ]) + print('Ingress Successfully Set %s' % data) +except ClientError as e: + print(e) + +print("Running new DB instance...") +print("------------------------------------") + +response = ec2Client.run_instances( + ImageId=imageId, + InstanceType=instanceType, + Placement={'AvailabilityZone': availabilityZone, }, + KeyName=keyName, + MinCount=1, + MaxCount=1, + UserData=userDataDB, + SecurityGroupIds=[ + security_group_id, + ], + TagSpecifications=[ + { + 'ResourceType': 'instance', + 'Tags': [ + {'Key': 'Name', 'Value': 'tug-of-war-asg-db1'}, + {'Key': 'tug-of-war-asg', 'Value': 'db'} + ], + } + ], +) + +instanceIdDB = response['Instances'][0]['InstanceId'] +privateIpDB = response['Instances'][0]['PrivateIpAddress'] +# privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId'] + +instance = ec2Resource.Instance(instanceIdDB) +instance.wait_until_running() + +print(instanceIdDB) + +userDataWebServer = ('#!/bin/bash\n' + '# extra repo for RedHat rpms\n' + 'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n' + '# essential tools\n' + 'yum install -y joe htop git\n' + '# mysql\n' + 'yum install -y httpd php php-mysql\n' + '\n' + 'service httpd start\n' + 'service httpd start\n' + '\n' + # 'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n' + # 'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n' + # 'tar zxvf tug-of-war-in-the-clouds.tar.gz\n' + 'cd /var/www/html\n' + 'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/index.php\n' + 'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/cloud.php\n' + 'wget https://gogs.informatik.hs-fulda.de/srieger/cloud-computing-msc-ai-examples/raw/master/example-projects/tug-of-war-in-the-clouds/web-content/config.php\n' + '\n' + '# change hostname of db connection\n' + 'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n' + ) + +print("Creating launch configuration...") +print("------------------------------------") + +response = asClient.create_launch_configuration( + #IamInstanceProfile='my-iam-role', + ImageId=imageId, + InstanceType=instanceType, + LaunchConfigurationName='tug-of-war-asg-launchconfig', + UserData=userDataWebServer, + KeyName=keyName, + SecurityGroups=[ + security_group_id, + ], +) + +elbv2Client = boto3.client('elbv2') + +print("Creating load balancer...") +print("------------------------------------") + +response = elbv2Client.create_load_balancer( + Name='tug-of-war-asg-loadbalancer', + Subnets=[ + subnet1, + subnet2, + subnet3, + ], + SecurityGroups=[ + security_group_id + ] +) + +loadbalancer_arn = response.get('LoadBalancers', [{}])[0].get('LoadBalancerArn', '') +loadbalancer_dns = response.get('LoadBalancers', [{}])[0].get('DNSName', '') + +print("Creating target group...") +print("------------------------------------") + +response = elbv2Client.create_target_group( + Name='tug-of-war-asg-targetgroup', + Port=80, + Protocol='HTTP', + VpcId=vpc_id, +) + +targetgroup_arn = response.get('TargetGroups', [{}])[0].get('TargetGroupArn', '') + +print("Creating listener...") +print("------------------------------------") + +response = elbv2Client.create_listener( + DefaultActions=[ + { + 'TargetGroupArn': targetgroup_arn, + 'Type': 'forward', + }, + ], + LoadBalancerArn=loadbalancer_arn, + Port=80, + Protocol='HTTP', +) + +response = elbv2Client.modify_target_group_attributes( + TargetGroupArn=targetgroup_arn, + Attributes=[ + { + 'Key': 'stickiness.enabled', + 'Value': 'true' + }, + ] +) + +print("Creating auto scaling group...") +print("------------------------------------") + +response = asClient.create_auto_scaling_group( + AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', + LaunchConfigurationName='tug-of-war-asg-launchconfig', + MaxSize=3, + MinSize=1, + HealthCheckGracePeriod=120, + HealthCheckType='ELB', + TargetGroupARNs=[ + targetgroup_arn, + ], + VPCZoneIdentifier=subnet1 + ', ' + ', ' + subnet2 + ', ' + subnet3, + Tags=[ + {'Key': 'Name', 'Value': 'tug-of-war-asg-webserver', 'PropagateAtLaunch': True}, + {'Key': 'tug-of-war', 'Value': 'webserver', 'PropagateAtLaunch': True} + ], +) + +print('app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[2]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[1]+'target-group-id') + +response = asClient.put_scaling_policy( + AutoScalingGroupName='tug-of-war-asg-autoscalinggroup', + PolicyName='tug-of-war-asg-scalingpolicy', + PolicyType='TargetTrackingScaling', + EstimatedInstanceWarmup=30, + TargetTrackingConfiguration={ + 'PredefinedMetricSpecification': { + 'PredefinedMetricType': 'ALBRequestCountPerTarget', + 'ResourceLabel': 'app/tug-of-war-asg-loadbalancer/'+str(loadbalancer_arn).split('/')[2]+'/targetgroup/tug-of-war-asg-targetgroup/'+str(targetgroup_arn).split('/')[1]+'target-group-id' + }, + 'TargetValue': 5.0, + } +)