diff --git a/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png b/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png index 52cd6dd..c78e8dd 100644 Binary files a/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png and b/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc-designer.png differ diff --git a/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json b/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json index e6cf647..adc4602 100644 --- a/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json +++ b/aws-cloudformation-demo/cloudcomp-counter-demo-with-vpc.json @@ -1,546 +1,546 @@ -{ - "AWSTemplateFormatVersion": "2010-09-09", - "Parameters": { - "paramImageID": { - "Type": "AWS::EC2::Image::Id", - "Default": "ami-f573e19a", - "Description": "Amazon Image ID (Amazon Linux), Frankfurt ami-f573e19a, N. Virginia ami-4dd18837" - }, - "paramInstanceType": { - "Type": "String", - "Default": "t2.nano", - "AllowedValues": [ - "t2.nano", - "t2.micro", - "m1.small" - ], - "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." - }, - "paramKeyPair": { - "Type": "AWS::EC2::KeyPair::KeyName", - "Description": "Amazon EC2 Key Pair" - }, - "paramIamInstanceRole": { - "Type": "String", - "Default": "ec2-s3-vertsys-access-role", - "Description": "IAM Instance Role" - } - }, - "Resources": { - "lcVertSysAutoScaleConfigv11": { - "Type": "AWS::AutoScaling::LaunchConfiguration", - "Properties": { - "AssociatePublicIpAddress": true, - "ImageId": { - "Ref": "paramImageID" - }, - "InstanceType": { - "Ref": "paramInstanceType" - }, - "KeyName": { - "Ref": "paramKeyPair" - }, - "IamInstanceProfile": { - "Ref": "paramIamInstanceRole" - }, - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "UserData": { - "Fn::Base64": { - "Fn::Join": [ - "", - [ - "#!/bin/bash\n", - "\n", - "# this script will be run during the boot process by each VertSys instance created\n", - "# in AWS currently this is a plain bash script that requires a RedHat based image\n", - "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", - "# distros\n", - "#\n", - "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", - "\n", - "# Config\n", - "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", - "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", - "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", - "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", - "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", - "\n", - "# Create path to run the script\n", - "mkdir $SCRIPT_ROOT_PATH\n", - "cd $SCRIPT_ROOT_PATH\n", - "\n", - "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", - "wget http://169.254.169.254/latest/user-data\n", - "chmod +x user-data\n", - "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", - "\n", - "# setting console prompt to include location (availability zone and region in AWS)\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", - "\n", - "# wait for internet connection, should not be necessary, but just in case ;)\n", - "while ! ping -c 1 -W 1 8.8.8.8; do\n", - " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", - " sleep 1\n", - "done\n", - "\n", - "# installation of required packages\n", - "echo \"Installing packages...\"\n", - "sudo yum update -y\n", - "sudo yum install -y java git\n", - "#rm -rf verteilte-systeme-bsc-ai-examples\n", - "if [ ! -d $VERTSYS_PATH ]; then\n", - " echo \"Cloning repo...\"\n", - " git clone $REPO\n", - "fi\n", - "\n", - "# killall running screens, .e.g to cleanup if script is run again after boot\n", - "killall screen\n", - "# start all jars\n", - "echo \"Starting JARS: ${JARS}...\"\n", - "for JAR in $JARS; do\n", - " echo \"Starting ${JAR}...\"\n", - " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", - "done\n", - "\n", - "# wait a second, to allow java services to start\n", - "sleep 1\n", - "\n", - "# output status of ports 36000-36199 and all running processes\n", - "echo \"Status:\"\n", - "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", - "sudo ps aux | grep java\n", - "\n", - "# Example for path and contents:\n", - "#\n", - "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", - "#\n", - "#build-server-jars.xml TCPServerMulti.jar\n", - "#RMIEchoServer.jar UDPServer.jar\n", - "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", - "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", - "#TCPServer.jar\n" - ] - ] - } - } - } - }, - "vpcCloudCompCounterDemo": { - "Type": "AWS::EC2::VPC", - "Properties": { - "CidrBlock": "10.0.0.0/16", - "EnableDnsSupport": "true", - "EnableDnsHostnames": "true", - "Tags": [ - { - "Key": "Name", - "Value": "vpcCloudCompCounterDemo" - } - ] - } - }, - "subnetCloudCompCounterDemoPublicSubnetAz1": { - "Type": "AWS::EC2::Subnet", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "CidrBlock": "10.0.0.0/24", - "AvailabilityZone": { - "Fn::Select": [ - "0", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - }, - "Tags": [ - { - "Key": "Name", - "Value": "subnetCloudCompCounterDemoPublicSubnetAz1" - } - ] - } - }, - "subnetCloudCompCounterDemoPublicSubnetAz2": { - "Type": "AWS::EC2::Subnet", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "CidrBlock": "10.0.1.0/24", - "AvailabilityZone": { - "Fn::Select": [ - "1", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - }, - "Tags": [ - { - "Key": "Name", - "Value": "subnetCloudCompCounterDemoPublicSubnetAz2" - } - ] - } - }, - "igCloudCompCounterDemo": { - "Type": "AWS::EC2::InternetGateway", - "Properties": { - "Tags": [ - { - "Key": "Name", - "Value": "igCloudCompCounterDemo" - } - ] - } - }, - "attachGateway": { - "Type": "AWS::EC2::VPCGatewayAttachment", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "InternetGatewayId": { - "Ref": "igCloudCompCounterDemo" - } - } - }, - "routetableViaIgw": { - "Type": "AWS::EC2::RouteTable", - "Properties": { - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - }, - "Tags": [ - { - "Key": "Name", - "Value": "routetableViaIgw" - } - ] - } - }, - "publicrouteViaIgw": { - "Type": "AWS::EC2::Route", - "DependsOn": "attachGateway", - "Properties": { - "RouteTableId": { - "Ref": "routetableViaIgw" - }, - "DestinationCidrBlock": "0.0.0.0/0", - "GatewayId": { - "Ref": "igCloudCompCounterDemo" - } - } - }, - "publicsubnet1RouteTableAssociation": { - "Type": "AWS::EC2::SubnetRouteTableAssociation", - "Properties": { - "SubnetId": { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" - }, - "RouteTableId": { - "Ref": "routetableViaIgw" - } - } - }, - "publicsubnet2RouteTableAssociation": { - "Type": "AWS::EC2::SubnetRouteTableAssociation", - "Properties": { - "SubnetId": { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" - }, - "RouteTableId": { - "Ref": "routetableViaIgw" - } - } - }, - "sgCloudCompDemoSecurityGroup": { - "Type": "AWS::EC2::SecurityGroup", - "Properties": { - "GroupDescription": "CloudComp Counter Demo", - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - } - } - }, - "ingress1": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress2": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "22", - "ToPort": "22", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress3": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "udp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "egress1": { - "Type": "AWS::EC2::SecurityGroupEgress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "-1", - "CidrIp": "0.0.0.0/0" - } - }, - "asgCloudCompAutoScaleGroup": { - "Type": "AWS::AutoScaling::AutoScalingGroup", - "Properties": { - "AvailabilityZones": [ - { - "Fn::Select": [ - "0", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - }, - { - "Fn::Select": [ - "1", - { - "Fn::GetAZs": { - "Ref": "AWS::Region" - } - } - ] - } - ], - "TargetGroupARNs": [ - { - "Ref": "elbCloudCompTargetGroup" - } - ], - "Cooldown": "30", - "DesiredCapacity": "1", - "HealthCheckGracePeriod": "60", - "HealthCheckType": "EC2", - "MaxSize": "3", - "MinSize": "1", - "VPCZoneIdentifier": [ - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" - }, - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" - } - ], - "LaunchConfigurationName": { - "Ref": "lcVertSysAutoScaleConfigv11" - }, - "MetricsCollection": [ - { - "Granularity": "1Minute", - "Metrics": [ - "GroupPendingInstances", - "GroupMinSize", - "GroupDesiredCapacity", - "GroupTerminatingInstances", - "GroupInServiceInstances", - "GroupStandbyInstances", - "GroupMaxSize", - "GroupTotalInstances" - ] - } - ], - "TerminationPolicies": [ - "Default" - ] - } - }, - "sgCloudCompScalePolicy": { - "Type": "AWS::AutoScaling::ScalingPolicy", - "DependsOn": "elbCloudCompListener", - "Properties": { - "PolicyType": "TargetTrackingScaling", - "EstimatedInstanceWarmup": 60, - "TargetTrackingConfiguration": { - "DisableScaleIn": false, - "TargetValue": 5, - "PredefinedMetricSpecification": { - "PredefinedMetricType": "ALBRequestCountPerTarget", - "ResourceLabel": { - "Fn::Join": [ - "/", - [ - "app/elbCloudCompLoadBalancer", - { - "Fn::Select": [ - "3", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompLoadBalancer" - } - ] - } - ] - }, - "targetgroup/elbCloudCompTargetGroup", - { - "Fn::Select": [ - "2", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompTargetGroup" - } - ] - } - ] - } - ] - ] - } - } - }, - "AutoScalingGroupName": { - "Ref": "asgCloudCompAutoScaleGroup" - } - } - }, - "elbCloudCompLoadBalancer": { - "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", - "Properties": { - "Name": "elbCloudCompLoadBalancer", - "IpAddressType": "ipv4", - "Type": "application", - "Scheme": "internet-facing", - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "Subnets": [ - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" - }, - { - "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" - } - ] - } - }, - "elbCloudCompTargetGroup": { - "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", - "Properties": { - "Port": 36042, - "HealthCheckIntervalSeconds": 30, - "HealthCheckTimeoutSeconds": 5, - "HealthyThresholdCount": 2, - "UnhealthyThresholdCount": 2, - "HealthCheckPath": "/counter", - "HealthCheckProtocol": "HTTP", - "TargetGroupAttributes": [ - { - "Key": "deregistration_delay.timeout_seconds", - "Value": "20" - } - ], - "Protocol": "HTTP", - "TargetType": "instance", - "Matcher": { - "HttpCode": "200" - }, - "Name": "elbCloudCompTargetGroup", - "VpcId": { - "Ref": "vpcCloudCompCounterDemo" - } - } - }, - "elbCloudCompListener": { - "Type": "AWS::ElasticLoadBalancingV2::Listener", - "Properties": { - "LoadBalancerArn": { - "Ref": "elbCloudCompLoadBalancer" - }, - "Protocol": "HTTP", - "Port": 36042, - "DefaultActions": [ - { - "Type": "forward", - "TargetGroupArn": { - "Ref": "elbCloudCompTargetGroup" - } - } - ] - } - } - }, - "Outputs": { - "LoadBalancer": { - "Description": "Load Balancer", - "Value": { - "Ref": "elbCloudCompLoadBalancer" - } - }, - "LoadBalancerDns": { - "Description": "Load Balancer DNS", - "Value": { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - } - }, - "LoadBalancerURL": { - "Description": "Load Balancer URL", - "Value": { - "Fn::Join": [ - ":", - [ - { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - }, - "36042/counter" - ] - ] - } - } - }, - "Description": "CloudComp Counter Demo" +{ + "AWSTemplateFormatVersion": "2010-09-09", + "Parameters": { + "paramImageID": { + "Type": "AWS::EC2::Image::Id", + "Default": "ami-f573e19a", + "Description": "Amazon Image ID (Amazon Linux), Frankfurt ami-f573e19a, N. Virginia ami-4dd18837" + }, + "paramInstanceType": { + "Type": "String", + "Default": "t2.nano", + "AllowedValues": [ + "t2.nano", + "t2.micro", + "m1.small" + ], + "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." + }, + "paramKeyPair": { + "Type": "AWS::EC2::KeyPair::KeyName", + "Description": "Amazon EC2 Key Pair" + }, + "paramIamInstanceRole": { + "Type": "String", + "Default": "ec2-s3-vertsys-access-role", + "Description": "IAM Instance Role" + } + }, + "Resources": { + "lcVertSysAutoScaleConfigv11": { + "Type": "AWS::AutoScaling::LaunchConfiguration", + "Properties": { + "AssociatePublicIpAddress": true, + "ImageId": { + "Ref": "paramImageID" + }, + "InstanceType": { + "Ref": "paramInstanceType" + }, + "KeyName": { + "Ref": "paramKeyPair" + }, + "IamInstanceProfile": { + "Ref": "paramIamInstanceRole" + }, + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "UserData": { + "Fn::Base64": { + "Fn::Join": [ + "", + [ + "#!/bin/bash\n", + "\n", + "# this script will be run during the boot process by each VertSys instance created\n", + "# in AWS currently this is a plain bash script that requires a RedHat based image\n", + "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", + "# distros\n", + "#\n", + "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", + "\n", + "# Config\n", + "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", + "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", + "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", + "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", + "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", + "\n", + "# Create path to run the script\n", + "mkdir $SCRIPT_ROOT_PATH\n", + "cd $SCRIPT_ROOT_PATH\n", + "\n", + "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", + "wget http://169.254.169.254/latest/user-data\n", + "chmod +x user-data\n", + "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", + "\n", + "# setting console prompt to include location (availability zone and region in AWS)\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", + "\n", + "# wait for internet connection, should not be necessary, but just in case ;)\n", + "while ! ping -c 1 -W 1 8.8.8.8; do\n", + " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", + " sleep 1\n", + "done\n", + "\n", + "# installation of required packages\n", + "echo \"Installing packages...\"\n", + "sudo yum update -y\n", + "sudo yum install -y java git\n", + "#rm -rf verteilte-systeme-bsc-ai-examples\n", + "if [ ! -d $VERTSYS_PATH ]; then\n", + " echo \"Cloning repo...\"\n", + " git clone $REPO\n", + "fi\n", + "\n", + "# killall running screens, .e.g to cleanup if script is run again after boot\n", + "killall screen\n", + "# start all jars\n", + "echo \"Starting JARS: ${JARS}...\"\n", + "for JAR in $JARS; do\n", + " echo \"Starting ${JAR}...\"\n", + " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", + "done\n", + "\n", + "# wait a second, to allow java services to start\n", + "sleep 1\n", + "\n", + "# output status of ports 36000-36199 and all running processes\n", + "echo \"Status:\"\n", + "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", + "sudo ps aux | grep java\n", + "\n", + "# Example for path and contents:\n", + "#\n", + "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", + "#\n", + "#build-server-jars.xml TCPServerMulti.jar\n", + "#RMIEchoServer.jar UDPServer.jar\n", + "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", + "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", + "#TCPServer.jar\n" + ] + ] + } + } + } + }, + "vpcCloudCompCounterDemo": { + "Type": "AWS::EC2::VPC", + "Properties": { + "CidrBlock": "10.0.0.0/16", + "EnableDnsSupport": "true", + "EnableDnsHostnames": "true", + "Tags": [ + { + "Key": "Name", + "Value": "vpcCloudCompCounterDemo" + } + ] + } + }, + "subnetCloudCompCounterDemoPublicSubnetAz1": { + "Type": "AWS::EC2::Subnet", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "CidrBlock": "10.0.0.0/24", + "AvailabilityZone": { + "Fn::Select": [ + "0", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + }, + "Tags": [ + { + "Key": "Name", + "Value": "subnetCloudCompCounterDemoPublicSubnetAz1" + } + ] + } + }, + "subnetCloudCompCounterDemoPublicSubnetAz2": { + "Type": "AWS::EC2::Subnet", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "CidrBlock": "10.0.1.0/24", + "AvailabilityZone": { + "Fn::Select": [ + "1", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + }, + "Tags": [ + { + "Key": "Name", + "Value": "subnetCloudCompCounterDemoPublicSubnetAz2" + } + ] + } + }, + "igCloudCompCounterDemo": { + "Type": "AWS::EC2::InternetGateway", + "Properties": { + "Tags": [ + { + "Key": "Name", + "Value": "igCloudCompCounterDemo" + } + ] + } + }, + "attachGateway": { + "Type": "AWS::EC2::VPCGatewayAttachment", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "InternetGatewayId": { + "Ref": "igCloudCompCounterDemo" + } + } + }, + "routetableViaIgw": { + "Type": "AWS::EC2::RouteTable", + "Properties": { + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + }, + "Tags": [ + { + "Key": "Name", + "Value": "routetableViaIgw" + } + ] + } + }, + "publicrouteViaIgw": { + "Type": "AWS::EC2::Route", + "DependsOn": "attachGateway", + "Properties": { + "RouteTableId": { + "Ref": "routetableViaIgw" + }, + "DestinationCidrBlock": "0.0.0.0/0", + "GatewayId": { + "Ref": "igCloudCompCounterDemo" + } + } + }, + "publicsubnet1RouteTableAssociation": { + "Type": "AWS::EC2::SubnetRouteTableAssociation", + "Properties": { + "SubnetId": { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" + }, + "RouteTableId": { + "Ref": "routetableViaIgw" + } + } + }, + "publicsubnet2RouteTableAssociation": { + "Type": "AWS::EC2::SubnetRouteTableAssociation", + "Properties": { + "SubnetId": { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" + }, + "RouteTableId": { + "Ref": "routetableViaIgw" + } + } + }, + "sgCloudCompDemoSecurityGroup": { + "Type": "AWS::EC2::SecurityGroup", + "Properties": { + "GroupDescription": "CloudComp Counter Demo", + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + } + } + }, + "ingress1": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress2": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "22", + "ToPort": "22", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress3": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "udp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "egress1": { + "Type": "AWS::EC2::SecurityGroupEgress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "-1", + "CidrIp": "0.0.0.0/0" + } + }, + "asgCloudCompAutoScaleGroup": { + "Type": "AWS::AutoScaling::AutoScalingGroup", + "Properties": { + "AvailabilityZones": [ + { + "Fn::Select": [ + "0", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + }, + { + "Fn::Select": [ + "1", + { + "Fn::GetAZs": { + "Ref": "AWS::Region" + } + } + ] + } + ], + "TargetGroupARNs": [ + { + "Ref": "elbCloudCompTargetGroup" + } + ], + "Cooldown": "30", + "DesiredCapacity": "1", + "HealthCheckGracePeriod": "60", + "HealthCheckType": "EC2", + "MaxSize": "3", + "MinSize": "1", + "VPCZoneIdentifier": [ + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" + }, + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" + } + ], + "LaunchConfigurationName": { + "Ref": "lcVertSysAutoScaleConfigv11" + }, + "MetricsCollection": [ + { + "Granularity": "1Minute", + "Metrics": [ + "GroupPendingInstances", + "GroupMinSize", + "GroupDesiredCapacity", + "GroupTerminatingInstances", + "GroupInServiceInstances", + "GroupStandbyInstances", + "GroupMaxSize", + "GroupTotalInstances" + ] + } + ], + "TerminationPolicies": [ + "Default" + ] + } + }, + "sgCloudCompScalePolicy": { + "Type": "AWS::AutoScaling::ScalingPolicy", + "DependsOn": "elbCloudCompListener", + "Properties": { + "PolicyType": "TargetTrackingScaling", + "EstimatedInstanceWarmup": 60, + "TargetTrackingConfiguration": { + "DisableScaleIn": false, + "TargetValue": 5, + "PredefinedMetricSpecification": { + "PredefinedMetricType": "ALBRequestCountPerTarget", + "ResourceLabel": { + "Fn::Join": [ + "/", + [ + "app/elbCloudCompLoadBalancer", + { + "Fn::Select": [ + "3", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompLoadBalancer" + } + ] + } + ] + }, + "targetgroup/elbCloudCompTargetGroup", + { + "Fn::Select": [ + "2", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompTargetGroup" + } + ] + } + ] + } + ] + ] + } + } + }, + "AutoScalingGroupName": { + "Ref": "asgCloudCompAutoScaleGroup" + } + } + }, + "elbCloudCompLoadBalancer": { + "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", + "Properties": { + "Name": "elbCloudCompLoadBalancer", + "IpAddressType": "ipv4", + "Type": "application", + "Scheme": "internet-facing", + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "Subnets": [ + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz1" + }, + { + "Ref": "subnetCloudCompCounterDemoPublicSubnetAz2" + } + ] + } + }, + "elbCloudCompTargetGroup": { + "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", + "Properties": { + "Port": 36042, + "HealthCheckIntervalSeconds": 30, + "HealthCheckTimeoutSeconds": 5, + "HealthyThresholdCount": 2, + "UnhealthyThresholdCount": 2, + "HealthCheckPath": "/counter", + "HealthCheckProtocol": "HTTP", + "TargetGroupAttributes": [ + { + "Key": "deregistration_delay.timeout_seconds", + "Value": "20" + } + ], + "Protocol": "HTTP", + "TargetType": "instance", + "Matcher": { + "HttpCode": "200" + }, + "Name": "elbCloudCompTargetGroup", + "VpcId": { + "Ref": "vpcCloudCompCounterDemo" + } + } + }, + "elbCloudCompListener": { + "Type": "AWS::ElasticLoadBalancingV2::Listener", + "Properties": { + "LoadBalancerArn": { + "Ref": "elbCloudCompLoadBalancer" + }, + "Protocol": "HTTP", + "Port": 36042, + "DefaultActions": [ + { + "Type": "forward", + "TargetGroupArn": { + "Ref": "elbCloudCompTargetGroup" + } + } + ] + } + } + }, + "Outputs": { + "LoadBalancer": { + "Description": "Load Balancer", + "Value": { + "Ref": "elbCloudCompLoadBalancer" + } + }, + "LoadBalancerDns": { + "Description": "Load Balancer DNS", + "Value": { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + } + }, + "LoadBalancerURL": { + "Description": "Load Balancer URL", + "Value": { + "Fn::Join": [ + ":", + [ + { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + }, + "36042/counter" + ] + ] + } + } + }, + "Description": "CloudComp Counter Demo" } \ No newline at end of file diff --git a/aws-cloudformation-demo/cloudcomp-counter-demo.json b/aws-cloudformation-demo/cloudcomp-counter-demo.json index 27a8d55..1814e58 100644 --- a/aws-cloudformation-demo/cloudcomp-counter-demo.json +++ b/aws-cloudformation-demo/cloudcomp-counter-demo.json @@ -1,394 +1,394 @@ -{ - "AWSTemplateFormatVersion": "2010-09-09", - "Parameters": { - "paramImageID": { - "Type": "AWS::EC2::Image::Id", - "Default": "ami-f573e19a", - "Description": "Amazon Image ID" - }, - "paramInstanceType": { - "Type": "String", - "Default": "t2.nano", - "AllowedValues": [ - "t2.nano", - "t2.micro", - "m1.small" - ], - "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." - }, - "paramKeyPair": { - "Type": "AWS::EC2::KeyPair::KeyName", - "Description": "Amazon EC2 Key Pair" - }, - "paramIamInstanceRole": { - "Type": "String", - "Default": "ec2-s3-vertsys-access-role", - "Description": "IAM Instance Role" - }, - "paramVPC": { - "Type": "AWS::EC2::VPC::Id", - "Description": "VPC" - }, - "paramSubnetIDs": { - "Type": "List", - "Description": "Subnet IDs" - }, - "paramAvailabilityZones": { - "Type": "List", - "Description": "AvailabilityZones" - } - }, - "Resources": { - "lcVertSysAutoScaleConfigv11": { - "Type": "AWS::AutoScaling::LaunchConfiguration", - "Properties": { - "AssociatePublicIpAddress": true, - "ImageId": { - "Ref": "paramImageID" - }, - "InstanceType": { - "Ref": "paramInstanceType" - }, - "KeyName": { - "Ref": "paramKeyPair" - }, - "IamInstanceProfile": { - "Ref": "paramIamInstanceRole" - }, - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "UserData": { - "Fn::Base64": { - "Fn::Join": [ - "", - [ - "#!/bin/bash\n", - "\n", - "# this script will be run during the boot process by each VertSys instance created\n", - "# in AWS currently this is a plain bash script that requires a RedHat based image\n", - "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", - "# distros\n", - "#\n", - "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", - "\n", - "# Config\n", - "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", - "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", - "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", - "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", - "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", - "\n", - "# Create path to run the script\n", - "mkdir $SCRIPT_ROOT_PATH\n", - "cd $SCRIPT_ROOT_PATH\n", - "\n", - "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", - "wget http://169.254.169.254/latest/user-data\n", - "chmod +x user-data\n", - "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", - "\n", - "# setting console prompt to include location (availability zone and region in AWS)\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", - "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", - "\n", - "# wait for internet connection, should not be necessary, but just in case ;)\n", - "while ! ping -c 1 -W 1 8.8.8.8; do\n", - " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", - " sleep 1\n", - "done\n", - "\n", - "# installation of required packages\n", - "echo \"Installing packages...\"\n", - "sudo yum update -y\n", - "sudo yum install -y java git\n", - "#rm -rf verteilte-systeme-bsc-ai-examples\n", - "if [ ! -d $VERTSYS_PATH ]; then\n", - " echo \"Cloning repo...\"\n", - " git clone $REPO\n", - "fi\n", - "\n", - "# killall running screens, .e.g to cleanup if script is run again after boot\n", - "killall screen\n", - "# start all jars\n", - "echo \"Starting JARS: ${JARS}...\"\n", - "for JAR in $JARS; do\n", - " echo \"Starting ${JAR}...\"\n", - " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", - "done\n", - "\n", - "# wait a second, to allow java services to start\n", - "sleep 1\n", - "\n", - "# output status of ports 36000-36199 and all running processes\n", - "echo \"Status:\"\n", - "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", - "sudo ps aux | grep java\n", - "\n", - "# Example for path and contents:\n", - "#\n", - "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", - "#\n", - "#build-server-jars.xml TCPServerMulti.jar\n", - "#RMIEchoServer.jar UDPServer.jar\n", - "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", - "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", - "#TCPServer.jar\n" - ] - ] - } - } - } - }, - "sgCloudCompDemoSecurityGroup": { - "Type": "AWS::EC2::SecurityGroup", - "Properties": { - "GroupDescription": "CloudComp Counter Demo", - "VpcId": { - "Ref": "paramVPC" - } - } - }, - "ingress1": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress2": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "tcp", - "FromPort": "22", - "ToPort": "22", - "CidrIp": "0.0.0.0/0" - } - }, - "ingress3": { - "Type": "AWS::EC2::SecurityGroupIngress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "udp", - "FromPort": "36037", - "ToPort": "36137", - "CidrIp": "0.0.0.0/0" - } - }, - "egress1": { - "Type": "AWS::EC2::SecurityGroupEgress", - "Properties": { - "GroupId": { - "Ref": "sgCloudCompDemoSecurityGroup" - }, - "IpProtocol": "-1", - "CidrIp": "0.0.0.0/0" - } - }, - "asgCloudCompAutoScaleGroup": { - "Type": "AWS::AutoScaling::AutoScalingGroup", - "Properties": { - "AvailabilityZones": { - "Ref": "paramAvailabilityZones" - }, - "TargetGroupARNs": [ - { - "Ref": "elbCloudCompTargetGroup" - } - ], - "Cooldown": "30", - "DesiredCapacity": "1", - "HealthCheckGracePeriod": "60", - "HealthCheckType": "EC2", - "MaxSize": "3", - "MinSize": "1", - "VPCZoneIdentifier": { - "Ref": "paramSubnetIDs" - }, - "LaunchConfigurationName": { - "Ref": "lcVertSysAutoScaleConfigv11" - }, - "MetricsCollection": [ - { - "Granularity": "1Minute", - "Metrics": [ - "GroupPendingInstances", - "GroupMinSize", - "GroupDesiredCapacity", - "GroupTerminatingInstances", - "GroupInServiceInstances", - "GroupStandbyInstances", - "GroupMaxSize", - "GroupTotalInstances" - ] - } - ], - "TerminationPolicies": [ - "Default" - ] - } - }, - "sgCloudCompScalePolicy": { - "Type": "AWS::AutoScaling::ScalingPolicy", - "DependsOn": "elbCloudCompListener", - "Properties": { - "PolicyType": "TargetTrackingScaling", - "EstimatedInstanceWarmup": 60, - "TargetTrackingConfiguration": { - "DisableScaleIn": false, - "TargetValue": 5, - "PredefinedMetricSpecification": { - "PredefinedMetricType": "ALBRequestCountPerTarget", - "ResourceLabel": { - "Fn::Join": [ - "/", - [ - "app/elbCloudCompLoadBalancer", - { - "Fn::Select": [ - "3", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompLoadBalancer" - } - ] - } - ] - }, - "targetgroup/elbCloudCompTargetGroup", - { - "Fn::Select": [ - "2", - { - "Fn::Split": [ - "/", - { - "Ref": "elbCloudCompTargetGroup" - } - ] - } - ] - } - ] - ] - } - } - }, - "AutoScalingGroupName": { - "Ref": "asgCloudCompAutoScaleGroup" - } - } - }, - "elbCloudCompLoadBalancer": { - "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", - "Properties": { - "Name": "elbCloudCompLoadBalancer", - "IpAddressType": "ipv4", - "Type": "application", - "Scheme": "internet-facing", - "SecurityGroups": [ - { - "Ref": "sgCloudCompDemoSecurityGroup" - } - ], - "Subnets": { - "Ref": "paramSubnetIDs" - } - } - }, - "elbCloudCompTargetGroup": { - "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", - "Properties": { - "Port": 36042, - "HealthCheckIntervalSeconds": 30, - "HealthCheckTimeoutSeconds": 5, - "HealthyThresholdCount": 2, - "UnhealthyThresholdCount": 2, - "HealthCheckPath": "/counter", - "HealthCheckProtocol": "HTTP", - "TargetGroupAttributes": [ - { - "Key": "deregistration_delay.timeout_seconds", - "Value": "20" - } - ], - "Protocol": "HTTP", - "TargetType": "instance", - "Matcher": { - "HttpCode": "200" - }, - "Name": "elbCloudCompTargetGroup", - "VpcId": { - "Ref": "paramVPC" - } - } - }, - "elbCloudCompListener": { - "Type": "AWS::ElasticLoadBalancingV2::Listener", - "Properties": { - "LoadBalancerArn": { - "Ref": "elbCloudCompLoadBalancer" - }, - "Protocol": "HTTP", - "Port": 36042, - "DefaultActions": [ - { - "Type": "forward", - "TargetGroupArn": { - "Ref": "elbCloudCompTargetGroup" - } - } - ] - } - } - }, - "Outputs": { - "LoadBalancer": { - "Description": "Load Balancer", - "Value": { - "Ref": "elbCloudCompLoadBalancer" - } - }, - "LoadBalancerDns": { - "Description": "Load Balancer DNS", - "Value": { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - } - }, - "LoadBalancerURL": { - "Description": "Load Balancer URL", - "Value": { - "Fn::Join": [ - ":", - [ - { - "Fn::GetAtt": [ - "elbCloudCompLoadBalancer", - "DNSName" - ] - }, - "36042/counter" - ] - ] - } - } - }, - "Description": "CloudComp Counter Demo" +{ + "AWSTemplateFormatVersion": "2010-09-09", + "Parameters": { + "paramImageID": { + "Type": "AWS::EC2::Image::Id", + "Default": "ami-f573e19a", + "Description": "Amazon Image ID" + }, + "paramInstanceType": { + "Type": "String", + "Default": "t2.nano", + "AllowedValues": [ + "t2.nano", + "t2.micro", + "m1.small" + ], + "Description": "Enter t2.micro, m1.small, or m1.large. Default is t2.micro." + }, + "paramKeyPair": { + "Type": "AWS::EC2::KeyPair::KeyName", + "Description": "Amazon EC2 Key Pair" + }, + "paramIamInstanceRole": { + "Type": "String", + "Default": "ec2-s3-vertsys-access-role", + "Description": "IAM Instance Role" + }, + "paramVPC": { + "Type": "AWS::EC2::VPC::Id", + "Description": "VPC" + }, + "paramSubnetIDs": { + "Type": "List", + "Description": "Subnet IDs" + }, + "paramAvailabilityZones": { + "Type": "List", + "Description": "AvailabilityZones" + } + }, + "Resources": { + "lcVertSysAutoScaleConfigv11": { + "Type": "AWS::AutoScaling::LaunchConfiguration", + "Properties": { + "AssociatePublicIpAddress": true, + "ImageId": { + "Ref": "paramImageID" + }, + "InstanceType": { + "Ref": "paramInstanceType" + }, + "KeyName": { + "Ref": "paramKeyPair" + }, + "IamInstanceProfile": { + "Ref": "paramIamInstanceRole" + }, + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "UserData": { + "Fn::Base64": { + "Fn::Join": [ + "", + [ + "#!/bin/bash\n", + "\n", + "# this script will be run during the boot process by each VertSys instance created\n", + "# in AWS currently this is a plain bash script that requires a RedHat based image\n", + "# (AMI) could be ported to cloud-init for better compatibility with other Linux\n", + "# distros\n", + "#\n", + "# see https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/user-data.html\n", + "\n", + "# Config\n", + "SCRIPT_ROOT_PATH=\"/tmp/init-script\"\n", + "VERTSYS_PATH=\"$SCRIPT_ROOT_PATH/verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\"\n", + "#JARS = \"TCPServer.jar TCPServerMulti.jar UDPServer.jar UDPServerMulti.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPPerfServer.jar\"\n", + "JARS=\"TCPServer.jar TCPPerfServer.jar UDPServer.jar UDPTimeCounterServer.jar TCPTimeCounterServer.jar TCPTimeCounterRESTServer.jar\"\n", + "REPO=\"https://gogs.informatik.hs-fulda.de/srieger/verteilte-systeme-bsc-ai-examples.git\"\n", + "\n", + "# Create path to run the script\n", + "mkdir $SCRIPT_ROOT_PATH\n", + "cd $SCRIPT_ROOT_PATH\n", + "\n", + "# fetch user-data (should be the content of this script itself ;)) to be able check it later and run it again\n", + "wget http://169.254.169.254/latest/user-data\n", + "chmod +x user-data\n", + "wget http://169.254.169.254/latest/meta-data/placement/availability-zone\n", + "\n", + "# setting console prompt to include location (availability zone and region in AWS)\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[32m \\W]$ '\" >>/root/.bashrc\n", + "echo \"PS1='[\\u@\\h@\\e[32m`cat /tmp/init-script/availability-zone`\\e[39m \\W]$ '\" >>/home/ec2-user/.bashrc\n", + "\n", + "# wait for internet connection, should not be necessary, but just in case ;)\n", + "while ! ping -c 1 -W 1 8.8.8.8; do\n", + " echo \"Waiting for 8.8.8.8 - network interface might be down...\"\n", + " sleep 1\n", + "done\n", + "\n", + "# installation of required packages\n", + "echo \"Installing packages...\"\n", + "sudo yum update -y\n", + "sudo yum install -y java git\n", + "#rm -rf verteilte-systeme-bsc-ai-examples\n", + "if [ ! -d $VERTSYS_PATH ]; then\n", + " echo \"Cloning repo...\"\n", + " git clone $REPO\n", + "fi\n", + "\n", + "# killall running screens, .e.g to cleanup if script is run again after boot\n", + "killall screen\n", + "# start all jars\n", + "echo \"Starting JARS: ${JARS}...\"\n", + "for JAR in $JARS; do\n", + " echo \"Starting ${JAR}...\"\n", + " sudo screen -dmS $JAR -L java -jar $VERTSYS_PATH/$JAR\n", + "done\n", + "\n", + "# wait a second, to allow java services to start\n", + "sleep 1\n", + "\n", + "# output status of ports 36000-36199 and all running processes\n", + "echo \"Status:\"\n", + "sudo netstat -taupen | grep 36[0,1][0-9][0-9]\n", + "sudo ps aux | grep java\n", + "\n", + "# Example for path and contents:\n", + "#\n", + "# ./verteilte-systeme-bsc-ai-examples/VerteilteSysteme-Examples/build/\n", + "#\n", + "#build-server-jars.xml TCPServerMulti.jar\n", + "#RMIEchoServer.jar UDPServer.jar\n", + "#RMIMandelbrotCalculationsServer.jar UDPServerMulti.jar\n", + "#TCPPerfServer.jar UDPTimeCounterServer.jar\n", + "#TCPServer.jar\n" + ] + ] + } + } + } + }, + "sgCloudCompDemoSecurityGroup": { + "Type": "AWS::EC2::SecurityGroup", + "Properties": { + "GroupDescription": "CloudComp Counter Demo", + "VpcId": { + "Ref": "paramVPC" + } + } + }, + "ingress1": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress2": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "tcp", + "FromPort": "22", + "ToPort": "22", + "CidrIp": "0.0.0.0/0" + } + }, + "ingress3": { + "Type": "AWS::EC2::SecurityGroupIngress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "udp", + "FromPort": "36037", + "ToPort": "36137", + "CidrIp": "0.0.0.0/0" + } + }, + "egress1": { + "Type": "AWS::EC2::SecurityGroupEgress", + "Properties": { + "GroupId": { + "Ref": "sgCloudCompDemoSecurityGroup" + }, + "IpProtocol": "-1", + "CidrIp": "0.0.0.0/0" + } + }, + "asgCloudCompAutoScaleGroup": { + "Type": "AWS::AutoScaling::AutoScalingGroup", + "Properties": { + "AvailabilityZones": { + "Ref": "paramAvailabilityZones" + }, + "TargetGroupARNs": [ + { + "Ref": "elbCloudCompTargetGroup" + } + ], + "Cooldown": "30", + "DesiredCapacity": "1", + "HealthCheckGracePeriod": "60", + "HealthCheckType": "EC2", + "MaxSize": "3", + "MinSize": "1", + "VPCZoneIdentifier": { + "Ref": "paramSubnetIDs" + }, + "LaunchConfigurationName": { + "Ref": "lcVertSysAutoScaleConfigv11" + }, + "MetricsCollection": [ + { + "Granularity": "1Minute", + "Metrics": [ + "GroupPendingInstances", + "GroupMinSize", + "GroupDesiredCapacity", + "GroupTerminatingInstances", + "GroupInServiceInstances", + "GroupStandbyInstances", + "GroupMaxSize", + "GroupTotalInstances" + ] + } + ], + "TerminationPolicies": [ + "Default" + ] + } + }, + "sgCloudCompScalePolicy": { + "Type": "AWS::AutoScaling::ScalingPolicy", + "DependsOn": "elbCloudCompListener", + "Properties": { + "PolicyType": "TargetTrackingScaling", + "EstimatedInstanceWarmup": 60, + "TargetTrackingConfiguration": { + "DisableScaleIn": false, + "TargetValue": 5, + "PredefinedMetricSpecification": { + "PredefinedMetricType": "ALBRequestCountPerTarget", + "ResourceLabel": { + "Fn::Join": [ + "/", + [ + "app/elbCloudCompLoadBalancer", + { + "Fn::Select": [ + "3", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompLoadBalancer" + } + ] + } + ] + }, + "targetgroup/elbCloudCompTargetGroup", + { + "Fn::Select": [ + "2", + { + "Fn::Split": [ + "/", + { + "Ref": "elbCloudCompTargetGroup" + } + ] + } + ] + } + ] + ] + } + } + }, + "AutoScalingGroupName": { + "Ref": "asgCloudCompAutoScaleGroup" + } + } + }, + "elbCloudCompLoadBalancer": { + "Type": "AWS::ElasticLoadBalancingV2::LoadBalancer", + "Properties": { + "Name": "elbCloudCompLoadBalancer", + "IpAddressType": "ipv4", + "Type": "application", + "Scheme": "internet-facing", + "SecurityGroups": [ + { + "Ref": "sgCloudCompDemoSecurityGroup" + } + ], + "Subnets": { + "Ref": "paramSubnetIDs" + } + } + }, + "elbCloudCompTargetGroup": { + "Type": "AWS::ElasticLoadBalancingV2::TargetGroup", + "Properties": { + "Port": 36042, + "HealthCheckIntervalSeconds": 30, + "HealthCheckTimeoutSeconds": 5, + "HealthyThresholdCount": 2, + "UnhealthyThresholdCount": 2, + "HealthCheckPath": "/counter", + "HealthCheckProtocol": "HTTP", + "TargetGroupAttributes": [ + { + "Key": "deregistration_delay.timeout_seconds", + "Value": "20" + } + ], + "Protocol": "HTTP", + "TargetType": "instance", + "Matcher": { + "HttpCode": "200" + }, + "Name": "elbCloudCompTargetGroup", + "VpcId": { + "Ref": "paramVPC" + } + } + }, + "elbCloudCompListener": { + "Type": "AWS::ElasticLoadBalancingV2::Listener", + "Properties": { + "LoadBalancerArn": { + "Ref": "elbCloudCompLoadBalancer" + }, + "Protocol": "HTTP", + "Port": 36042, + "DefaultActions": [ + { + "Type": "forward", + "TargetGroupArn": { + "Ref": "elbCloudCompTargetGroup" + } + } + ] + } + } + }, + "Outputs": { + "LoadBalancer": { + "Description": "Load Balancer", + "Value": { + "Ref": "elbCloudCompLoadBalancer" + } + }, + "LoadBalancerDns": { + "Description": "Load Balancer DNS", + "Value": { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + } + }, + "LoadBalancerURL": { + "Description": "Load Balancer URL", + "Value": { + "Fn::Join": [ + ":", + [ + { + "Fn::GetAtt": [ + "elbCloudCompLoadBalancer", + "DNSName" + ] + }, + "36042/counter" + ] + ] + } + } + }, + "Description": "CloudComp Counter Demo" } \ No newline at end of file diff --git a/demo3-microservice.py b/demo3-microservice.py index 49340a8..a7667e9 100644 --- a/demo3-microservice.py +++ b/demo3-microservice.py @@ -23,6 +23,7 @@ region_name = 'RegionOne' domain_name = "default" ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image" +#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image" flavor_name = 'm1.small' @@ -153,10 +154,20 @@ def main(): # ########################################################################### + # https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh + # is currently broken, hence the "rabbitctl" lines were added in the example + # below, see also https://bugs.launchpad.net/faafo/+bug/1679710 + # + # Thanks to Stefan Friedmann for finding this fix ;) + userdata = '''#!/usr/bin/env bash curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ -i messaging -i faafo -r api + rabbitmqctl add_user faafo guest + rabbitmqctl set_user_tags faafo administrator + rabbitmqctl set_permissions -p / faafo ".*" ".*" ".*" ''' + print('Starting new app-controller instance and wait until it is running...') instance_controller_1 = conn.create_node(name='app-controller', diff --git a/demo4-scale-out-add-worker.py b/demo4-scale-out-add-worker.py new file mode 100644 index 0000000..60a38d4 --- /dev/null +++ b/demo4-scale-out-add-worker.py @@ -0,0 +1,179 @@ +# import getpass +# import os +# import libcloud.security + +import time +from libcloud.compute.providers import get_driver +from libcloud.compute.types import Provider + +# reqs: +# services: nova, glance, neutron +# resources: 2 instances (m1.small), 2 floating ips (1 keypair, 2 security groups) + +# Please use 1-25 for X in username, project etc., as coordinated in the lab sessions + +# web service endpoint of the private cloud infrastructure +auth_url = 'https://private-cloud2.informatik.hs-fulda.de:5000' +# your username in OpenStack +auth_username = 'CloudCompX' +# your project in OpenStack +project_name = 'CloudCompGrpX' + +# default region +region_name = 'RegionOne' +# domain to use, "default" for local accounts, "hsfulda" for LDAP of DVZ, e.g., using fdaiXXXX as auth_username +domain_name = "default" + +ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image" +#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image" + +flavor_name = 'm1.small' + +network_name = "CloudCompGrpX-net" + +keypair_name = 'srieger-pub' +pub_key_file = '~/.ssh/id_rsa.pub' + + + +def main(): + ########################################################################### + # + # get credentials + # + ########################################################################### + + # if "OS_PASSWORD" in os.environ: + # auth_password = os.environ["OS_PASSWORD"] + # else: + # auth_password = getpass.getpass("Enter your OpenStack password:") + auth_password = "demo" + + ########################################################################### + # + # create connection + # + ########################################################################### + + # libcloud.security.VERIFY_SSL_CERT = False + + provider = get_driver(Provider.OPENSTACK) + conn = provider(auth_username, + auth_password, + ex_force_auth_url=auth_url, + ex_force_auth_version='3.x_password', + ex_tenant_name=project_name, + ex_force_service_region=region_name, + ex_domain_name=domain_name) + + ########################################################################### + # + # get image, flavor, network for instance creation + # + ########################################################################### + + images = conn.list_images() + image = '' + for img in images: + if img.name == ubuntu_image_name: + image = img + + flavors = conn.list_sizes() + flavor = '' + for flav in flavors: + if flav.name == flavor_name: + flavor = conn.ex_get_size(flav.id) + + networks = conn.ex_list_networks() + network = '' + for net in networks: + if net.name == network_name: + network = net + + ########################################################################### + # + # get fixed a ip for serivice and api instance + # (better would be shared IP for the cluster etc.) + # + ########################################################################### + + # find service instance + for instance in conn.list_nodes(): + if instance.name == 'app-services': + services_ip = instance.private_ips[0] + print('Found app-services fixed IP to be: ', services_ip) + if instance.name == 'app-api-1': + api_1_ip = instance.private_ips[0] + print('Found app-api-1 fixed IP to be: ', api_1_ip) + + ########################################################################### + # + # create keypair dependency + # + ########################################################################### + + print('Checking for existing SSH key pair...') + keypair_exists = False + for keypair in conn.list_key_pairs(): + if keypair.name == keypair_name: + keypair_exists = True + + if keypair_exists: + print('Keypair ' + keypair_name + ' already exists. Skipping import.') + else: + print('adding keypair...') + conn.import_key_pair_from_file(keypair_name, pub_key_file) + + for keypair in conn.list_key_pairs(): + print(keypair) + + ########################################################################### + # + # create security group dependency + # + ########################################################################### + + def get_security_group(connection, security_group_name): + """A helper function to check if security group already exists""" + print('Checking for existing ' + security_group_name + ' security group...') + for security_grp in connection.ex_list_security_groups(): + if security_grp.name == security_group_name: + print('Security Group ' + security_group_name + ' already exists. Skipping creation.') + return security_grp + return False + + if not get_security_group(conn, "worker"): + worker_security_group = conn.ex_create_security_group('worker', 'for services that run on a worker node') + conn.ex_create_security_group_rule(worker_security_group, 'TCP', 22, 22) + else: + worker_security_group = get_security_group(conn, "worker") + + for security_group in conn.ex_list_security_groups(): + print(security_group) + + ########################################################################### + # + # create worker instances + # + ########################################################################### + + userdata_worker = '''#!/usr/bin/env bash + curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ + -i faafo -r worker -e 'http://%(api_1_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/' + ''' % {'api_1_ip': api_1_ip, 'services_ip': services_ip} + + # userdata-api-2 = '''#!/usr/bin/env bash + # curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ + # -i faafo -r worker -e 'http://%(api_2_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/' + # ''' % {'api_2_ip': api_2_ip, 'services_ip': services_ip} + + print('Starting new app-worker-3 instance and wait until it is running...') + instance_worker_3 = conn.create_node(name='app-worker-3', + image=image, size=flavor, + networks=[network], + ex_keyname=keypair_name, + ex_userdata=userdata_worker, + ex_security_groups=[worker_security_group]) + +if __name__ == '__main__': + main() diff --git a/demo4-scale-out-destroy.py b/demo4-scale-out-destroy.py index 3619351..58edf8d 100644 --- a/demo4-scale-out-destroy.py +++ b/demo4-scale-out-destroy.py @@ -25,6 +25,7 @@ region_name = 'RegionOne' domain_name = "default" ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image" +#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image" flavor_name = 'm1.small' @@ -85,7 +86,8 @@ def main(): instances = conn.list_nodes() for instance in instances: # if we see any demo instances still running continue to wait for them to stop - if instance.name in ['all-in-one', 'app-worker-1', 'app-worker-2', 'app-controller']: + if instance.name in ['all-in-one', 'app-worker-1', 'app-worker-2', 'app-worker-3', 'app-controller', + 'app-services', 'app-api-1', 'app-api-2']: nodes_still_running = True print('There are still instances running, waiting for them to be destroyed...') diff --git a/demo4-scale-out.py b/demo4-scale-out.py index 98a9fb1..bf7e107 100644 --- a/demo4-scale-out.py +++ b/demo4-scale-out.py @@ -25,6 +25,7 @@ region_name = 'RegionOne' domain_name = "default" ubuntu_image_name = "Ubuntu 14.04 - Trusty Tahr - 64-bit - Cloud Based Image" +#ubuntu_image_name = "Ubuntu 18.04 - Bionic Beaver - 64-bit - Cloud Based Image" flavor_name = 'm1.small' @@ -214,9 +215,18 @@ def main(): # ########################################################################### - userdata = '''#!/usr/bin/env bash + # https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh + # is currently broken, hence the "rabbitctl" lines were added in the example + # below, see also https://bugs.launchpad.net/faafo/+bug/1679710 + # + # Thanks to Stefan Friedmann for finding this fix ;) + + userdata_service = '''#!/usr/bin/env bash curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ -i database -i messaging + rabbitmqctl add_user faafo guest + rabbitmqctl set_user_tags faafo administrator + rabbitmqctl set_permissions -p / faafo ".*" ".*" ".*" ''' print('Starting new app-services instance and wait until it is running...') @@ -225,7 +235,7 @@ def main(): size=flavor, networks=[network], ex_keyname=keypair_name, - ex_userdata=userdata, + ex_userdata=userdata_service, ex_security_groups=[services_security_group]) instance_services = conn.wait_until_running(nodes=[instance_services], timeout=120, ssh_interface='private_ips')[0][0] @@ -237,7 +247,7 @@ def main(): # ########################################################################### - userdata = '''#!/usr/bin/env bash + userdata_api = '''#!/usr/bin/env bash curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ -i faafo -r api -m 'amqp://guest:guest@%(services_ip)s:5672/' \ -d 'mysql+pymysql://faafo:password@%(services_ip)s:3306/faafo' @@ -249,7 +259,7 @@ def main(): size=flavor, networks=[network], ex_keyname=keypair_name, - ex_userdata=userdata, + ex_userdata=userdata_api, ex_security_groups=[api_security_group]) print('Starting new app-api-2 instance and wait until it is running...') @@ -258,7 +268,7 @@ def main(): size=flavor, networks=[network], ex_keyname=keypair_name, - ex_userdata=userdata, + ex_userdata=userdata_api, ex_security_groups=[api_security_group]) instance_api_1 = conn.wait_until_running(nodes=[instance_api_1], timeout=120, @@ -279,12 +289,12 @@ def main(): # ########################################################################### - userdata_api_1 = '''#!/usr/bin/env bash + userdata_worker = '''#!/usr/bin/env bash curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ -i faafo -r worker -e 'http://%(api_1_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/' ''' % {'api_1_ip': api_1_ip, 'services_ip': services_ip} - # userdata-api-2 = '''#!/usr/bin/env bash + # userdata_api-api-2 = '''#!/usr/bin/env bash # curl -L -s https://git.openstack.org/cgit/openstack/faafo/plain/contrib/install.sh | bash -s -- \ # -i faafo -r worker -e 'http://%(api_2_ip)s' -m 'amqp://guest:guest@%(services_ip)s:5672/' # ''' % {'api_2_ip': api_2_ip, 'services_ip': services_ip} @@ -294,28 +304,30 @@ def main(): image=image, size=flavor, networks=[network], ex_keyname=keypair_name, - ex_userdata=userdata_api_1, + ex_userdata=userdata_worker, ex_security_groups=[worker_security_group]) - print('Starting new app-worker-1 instance and wait until it is running...') + print('Starting new app-worker-2 instance and wait until it is running...') instance_worker_2 = conn.create_node(name='app-worker-2', image=image, size=flavor, networks=[network], ex_keyname=keypair_name, - ex_userdata=userdata_api_1, + ex_userdata=userdata_worker, ex_security_groups=[worker_security_group]) - print('Starting new app-worker-1 instance and wait until it is running...') - instance_worker_3 = conn.create_node(name='app-worker-3', - image=image, size=flavor, - networks=[network], - ex_keyname=keypair_name, - ex_userdata=userdata_api_1, - ex_security_groups=[worker_security_group]) + # do not start worker 3 initially, can be started using scale-out-add-worker.py demo + + #print('Starting new app-worker-3 instance and wait until it is running...') + #instance_worker_3 = conn.create_node(name='app-worker-3', + # image=image, size=flavor, + # networks=[network], + # ex_keyname=keypair_name, + # ex_userdata=userdata_worker, + # ex_security_groups=[worker_security_group]) print(instance_worker_1) print(instance_worker_2) - print(instance_worker_3) + #print(instance_worker_3) if __name__ == '__main__':