185 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			185 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
import boto3
 | 
						|
from botocore.exceptions import ClientError
 | 
						|
 | 
						|
region = 'eu-central-1'
 | 
						|
availabilityZone = 'eu-central-1b'
 | 
						|
imageId = 'ami-0cc293023f983ed53'
 | 
						|
instanceType = 't3.nano'
 | 
						|
keyName = 'srieger-pub'
 | 
						|
userDataDB = ('#!/bin/bash\n'
 | 
						|
    '#!/bin/bash\n'
 | 
						|
    '# extra repo for RedHat rpms\n'
 | 
						|
    'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
 | 
						|
    '# essential tools\n'
 | 
						|
    'yum install -y joe htop git\n'
 | 
						|
    '# mysql\n'
 | 
						|
    'yum install -y mariadb mariadb-server\n'
 | 
						|
    '\n'
 | 
						|
    'service mariadb start\n'
 | 
						|
    '\n'
 | 
						|
    'echo "create database cloud_tug_of_war" | mysql -u root\n'
 | 
						|
    '\n'
 | 
						|
    'echo "create table clouds ( cloud_id INT AUTO_INCREMENT, name VARCHAR(255) NOT NULL, value INT, max_value INT, PRIMARY KEY (cloud_id))" | mysql -u root cloud_tug_of_war\n'
 | 
						|
    '\n'
 | 
						|
    'echo "CREATE USER \'cloud_tug_of_war\'@\'%\' IDENTIFIED BY \'cloud\';" | mysql -u root\n'
 | 
						|
    'echo "GRANT ALL PRIVILEGES ON cloud_tug_of_war.* TO \'cloud_tug_of_war\'@\'%\';" | mysql -u root\n'
 | 
						|
    'echo "FLUSH PRIVILEGES" | mysql -u root\n'
 | 
						|
    )
 | 
						|
 | 
						|
# convert with: cat install-mysql | sed "s/^/'/; s/$/\\\n'/"
 | 
						|
 | 
						|
client = boto3.setup_default_session(region_name=region)
 | 
						|
ec2Client = boto3.client("ec2")
 | 
						|
ec2Resource = boto3.resource('ec2')
 | 
						|
 | 
						|
response = ec2Client.describe_vpcs()
 | 
						|
vpc_id = response.get('Vpcs', [{}])[0].get('VpcId', '')
 | 
						|
subnet_id = ec2Client.describe_subnets(
 | 
						|
    Filters=[
 | 
						|
        {
 | 
						|
            'Name': 'availability-zone', 'Values': [availabilityZone]
 | 
						|
        }
 | 
						|
    ])['Subnets'][0]['SubnetId']
 | 
						|
 | 
						|
print("Deleting old instance...")
 | 
						|
print("------------------------------------")
 | 
						|
 | 
						|
response = ec2Client.describe_instances(Filters=[{'Name': 'tag-key', 'Values': ['tug-of-war']}])
 | 
						|
print(response)
 | 
						|
reservations = response['Reservations']
 | 
						|
for reservation in reservations:
 | 
						|
    for instance in reservation['Instances']:
 | 
						|
        if instance['State']['Name'] == "running" or instance['State']['Name'] == "pending":
 | 
						|
            response = ec2Client.terminate_instances(InstanceIds=[instance['InstanceId']])
 | 
						|
            print(response)
 | 
						|
            instanceToTerminate = ec2Resource.Instance(instance['InstanceId'])
 | 
						|
            instanceToTerminate.wait_until_terminated()
 | 
						|
 | 
						|
print("Delete old security group...")
 | 
						|
print("------------------------------------")
 | 
						|
 | 
						|
try:
 | 
						|
    response = ec2Client.delete_security_group(GroupName='tug-of-war')
 | 
						|
except ClientError as e:
 | 
						|
    print(e)
 | 
						|
 | 
						|
print("Create security group...")
 | 
						|
print("------------------------------------")
 | 
						|
 | 
						|
try:
 | 
						|
    response = ec2Client.create_security_group(GroupName='tug-of-war',
 | 
						|
                                               Description='tug-of-war',
 | 
						|
                                               VpcId=vpc_id)
 | 
						|
    security_group_id = response['GroupId']
 | 
						|
    print('Security Group Created %s in vpc %s.' % (security_group_id, vpc_id))
 | 
						|
 | 
						|
    data = ec2Client.authorize_security_group_ingress(
 | 
						|
        GroupId=security_group_id,
 | 
						|
        IpPermissions=[
 | 
						|
            {'IpProtocol': 'tcp',
 | 
						|
             'FromPort': 3306,
 | 
						|
             'ToPort': 3306,
 | 
						|
             'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
 | 
						|
            {'IpProtocol': 'tcp',
 | 
						|
             'FromPort': 22,
 | 
						|
             'ToPort': 22,
 | 
						|
             'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
 | 
						|
            {'IpProtocol': 'tcp',
 | 
						|
             'FromPort': 80,
 | 
						|
             'ToPort': 80,
 | 
						|
             'IpRanges': [{'CidrIp': '0.0.0.0/0'}]},
 | 
						|
            {'IpProtocol': 'tcp',
 | 
						|
             'FromPort': 443,
 | 
						|
             'ToPort': 443,
 | 
						|
             'IpRanges': [{'CidrIp': '0.0.0.0/0'}]}
 | 
						|
        ])
 | 
						|
    print('Ingress Successfully Set %s' % data)
 | 
						|
except ClientError as e:
 | 
						|
    print(e)
 | 
						|
 | 
						|
print("Running new DB instance...")
 | 
						|
print("------------------------------------")
 | 
						|
 | 
						|
response = ec2Client.run_instances(
 | 
						|
    ImageId=imageId,
 | 
						|
    InstanceType=instanceType,
 | 
						|
    Placement={'AvailabilityZone': availabilityZone, },
 | 
						|
    KeyName=keyName,
 | 
						|
    MinCount=1,
 | 
						|
    MaxCount=1,
 | 
						|
    UserData=userDataDB,
 | 
						|
    SecurityGroupIds=[
 | 
						|
        security_group_id,
 | 
						|
    ],
 | 
						|
    TagSpecifications=[
 | 
						|
        {
 | 
						|
            'ResourceType': 'instance',
 | 
						|
            'Tags': [
 | 
						|
                {'Key': 'Name', 'Value': 'tug-of-war-db1'},
 | 
						|
                {'Key': 'tug-of-war', 'Value': 'installed'}
 | 
						|
            ],
 | 
						|
        }
 | 
						|
    ],
 | 
						|
)
 | 
						|
 | 
						|
instanceIdDB = response['Instances'][0]['InstanceId']
 | 
						|
privateIpDB = response['Instances'][0]['PrivateIpAddress']
 | 
						|
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
 | 
						|
 | 
						|
instance = ec2Resource.Instance(instanceIdDB)
 | 
						|
instance.wait_until_running()
 | 
						|
 | 
						|
print(instanceIdDB)
 | 
						|
 | 
						|
userDataWebServer = ('#!/bin/bash\n'
 | 
						|
    '# extra repo for RedHat rpms\n'
 | 
						|
    'yum install -y https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm\n'
 | 
						|
    '# essential tools\n'
 | 
						|
    'yum install -y joe htop git\n'
 | 
						|
    '# mysql\n'
 | 
						|
    'yum install -y httpd php php-mysql\n'
 | 
						|
    '\n'
 | 
						|
    'service httpd start\n'
 | 
						|
    '\n'
 | 
						|
    'wget http://mmnet.informatik.hs-fulda.de/cloudcomp/tug-of-war-in-the-clouds.tar.gz\n'
 | 
						|
    'cp tug-of-war-in-the-clouds.tar.gz /var/www/html/\n'
 | 
						|
    'cd /var/www/html\n'
 | 
						|
    'tar zxvf tug-of-war-in-the-clouds.tar.gz\n'
 | 
						|
    '\n'
 | 
						|
    '# change hostname of db connection\n'
 | 
						|
    'sed -i s/localhost/' + privateIpDB + '/g /var/www/html/config.php\n'
 | 
						|
    )
 | 
						|
 | 
						|
print("Running new Web Server instance...")
 | 
						|
print("------------------------------------")
 | 
						|
 | 
						|
response = ec2Client.run_instances(
 | 
						|
    ImageId=imageId,
 | 
						|
    InstanceType=instanceType,
 | 
						|
    Placement={'AvailabilityZone': availabilityZone, },
 | 
						|
    KeyName=keyName,
 | 
						|
    MinCount=1,
 | 
						|
    MaxCount=1,
 | 
						|
    UserData=userDataWebServer,
 | 
						|
    SecurityGroupIds=[
 | 
						|
        security_group_id,
 | 
						|
    ],
 | 
						|
 | 
						|
    TagSpecifications=[
 | 
						|
        {
 | 
						|
            'ResourceType': 'instance',
 | 
						|
            'Tags': [
 | 
						|
                {'Key': 'Name', 'Value': 'tug-of-war-webserver1'},
 | 
						|
                {'Key': 'tug-of-war', 'Value': 'installed'}
 | 
						|
            ],
 | 
						|
        }
 | 
						|
    ],
 | 
						|
)
 | 
						|
 | 
						|
instanceIdDB = response['Instances'][0]['InstanceId']
 | 
						|
privateIpDB = response['Instances'][0]['PrivateIpAddress']
 | 
						|
#privateIpDB = response['Instances'][0]['NetworkInterfaces'][0]['NetworkInterfaceId']
 | 
						|
 | 
						|
instance = ec2Resource.Instance(instanceIdDB)
 | 
						|
instance.wait_until_running()
 |