Coder Social home page Coder Social logo

rmarable / ec2instancemaker Goto Github PK

View Code? Open in Web Editor NEW
7.0 1.0 2.0 187 KB

Ec2InstanceMaker is a command line interface that makes it easy to build cloud servers and storage resources in an automated fashion.

Home Page: https://github.com/rmarable/Ec2InstanceMaker

License: Apache License 2.0

Python 59.15% Shell 12.99% Dockerfile 2.20% Jinja 25.67%

ec2instancemaker's Introduction

Ec2InstanceMaker - Easy Automation for Building Cloud Servers With Attached Storage

Ec2InstanceMaker is an Open Source command line interface that makes it easy to build, access, and destroy servers and storage resources in the cloud. It is also a useful teaching tool for those who want to dive deep into cloud computing, storage, and security paradigms, learn more about infrastructure automation, and explore the AWS ecosystem.

License Information

Please refer to the LICENSE document included with this Open Source software for the specific terms and conditions that govern its use.

Disclaimer

By using this Open Source software:

  • You accept all potential risks involved with your use of this Open Source software.

  • You agree that the author shall have no responsibility or liability for any losses or damages incurred in conjunction with your use of this Open Source Software.

  • You acknowledge that bugs may still be present, unexpected behavior might be observed, and some features may not be completely documented.

This Open Source software is authored by Rodney Marable in his individual capacity and is neither endorsed nor supported by Amazon Web Services.

You cannot create cases with AWS Technical Support or engage AWS support engineers in public forums if you have any questions, problems, or issues using this Open Source software.

"Play at your own risk!"
 -- Planet Patrol

About Ec2InstanceMaker

Ec2InstanceMaker is an Open Source command line wrapper toolkit that eases the automation, creation, and destruction of Amazon Elastic Compute Cloud (EC2) instance fleets that can optionally be attached to Elastic File System (EFS) or FSx for Lustre storage resources. This tool is designed to enable anyone to leverage cloud computing and storage resources at scale without requiring deep infrastructure knowledge or extensive experience with the AWS stack.

You can find more information about EC2, EC2 Spot, EFS, and FSx for Lustre by visiting:

Ec2InstanceMaker makes extensive use of Ansible, the Amazon Web Services SDK for Python (boto3), Terraform, and jq. It can be launched from a Docker container, local OSX or Linux environments, or from an existing EC2 instance. You can find more information about these tools by visiting:

Ec2InstanceMaker also requires Python 3.6 (or greater) and a functional Bash shell environment. As noted above, this tool can be run locally on OSX or Linux, on an existing EC2 Linux instance, from a Docker container, or from an EC2 instance spawned from a previous invocation of Ec2InstanceMaker. Please refer to the "Installing Ec2InstanceMaker" section for detailed guidance on how to properly configure your environment.

Running Ec2InstanceMaker locally on a Windows machine is not supported, although it should work in theory with appropriately configured Python and Bash-Cygwin environments.

Ec2InstanceMaker Features

Ec2InstanceMaker provides the following features through its command line interface:

  • Installation of multiple operating systems on EC2 instances:

    • Amazon Linux

    • Amazon Linux 2

    • CentOS 6

    • CentOS 7

    • Ubuntu 14.04LTS

    • Ubuntu 16.04LTS

    • Ubuntu 18.04LTS

    • Windows Server 2019

      Redhat, OpenSuse, and SLES may be supported in future releases.

  • Error checking to ensure that the selected operating system and EC2 instance type are compatible.

  • Administrative control over the allowed EC2 instance types that can be deployed.

  • Custom AMI support to enable deployment of standardized cloud computing environments. Please see "Working with Custom AMIs" below for more details on how to leverage these options which include:

    • Spawning of new instances from previously built user-supplied "custom AMIs."
    • Creation of new "golden images" using EC2 instances spawned from Ec2InstanceMaker as the source.
    • Easy inclusion of user customization scripts within the Ec2InstanceMaker provisioning process.
    • Optional construction of "golden images" with encrypted root EBS volumes.
    • Incorporation into existing DevOps CI/CD piplines.
  • Spawning EC2 instances from a Docker container.

  • Multiple instances with identical configurations built at the same time a.k.a. "instance families."

  • Command line designation of dev, test, stage, and prod operating levels.

  • Deployment of EC2 Spot instances with a adjustable price buffer to help prevent terminations caused by Spot market fluctuations.

  • Deployment of instance families into EC2 placement groups utilizing the "cluster" strategy.

  • Variable EBS root volume sizes up to 16 TB.

  • Automatic application of EBS optimization for supported instance types.

  • Attachment of provisioned IOPS, throughput optizimed, and general purpose (gp2) SSD EBS volumes during the instance creation process.

  • Creation of EFS file systems that share the instance lifecycle and tags.

    • Provisioned EFS throughput is NOT supported by this toolkit; please use Lustre if your use cases require high throughput or large IOPS beyond what "maxIO" or "burst mode" can provide.
  • Command line option to enable encryption of EFS at rest and in flight.

  • Create of FSx for Lustre file systems that share the instance(s) lifecycle and tags. Hydration to and from an S3 bucket is also supported.

  • Selective disabling of Intel HyperThreading.

  • Custom i.e. user-provided EC2 security groups.

  • Custom i.e. user-provided IAM instance profiles that can be created from user-supplied JSON policy documents or pre-existing IAM roles. Guidance for how to communicate with your local DevOps team to get their support with deployment of tthe aforementioned policy documents is also provided in the "Note to DevOps Teams" section below.

  • Control of the IAM namespace used by roles, instance profiles, and policies through the "iam_name_prefix" parameter. If this switch is not set, all IAM entitities default to using "Ec2InstanceMaker" as the prefix. This makes it easier for DevOps teams to incorporate Ec2InstanceMaker into architectures that are based on users assuming predefined roles to perform activities in the AWS environment.

  • Email notifications via SNS whenever an instance is created or deleted.

  • Identification of the instance owner, email address, and department using an easily extendable tagging framework. The instance can also be associated with a specific project identification tag. The department tagging mechanism is easily customizable to meet your use case.

  • Additional instance customization hooks using EC2 instance userdata or post-installation shell scripts. Please see the "Instance Customization" section for more details.

  • Custom scripting to automate deletion the instance or all members of the instance family at once.

  • Single-command SSH access to Linux instances. If multiple instances were created together, an easy-to-use menu is provided for the user to select the instance of interest.

  • For Windows instances, mapping of IP addresses to decrypted Administrator passwords in an easy-to-parse table dumped to the console. This information can be pasted into RDC for easy access.

  • Operability in Turbot environnments. Please visit https://www.turbot.com for more information.

  • Restriction of attaching public IP addresses for environments that require additional security.

  • Selection of a specific VPC. Note that the VPC must be named or Terraform will fail.

Installation Instructions for the Impatient

These instructions are provided for the impatient and/or lazy.

  • Install Homebrew (if using OSX).

  • Install and configure the AWS CLI.

  • Install Terraform.

  • Install Ansible.

  • Install jq.

  • Create and enable a virtual Python-3.7.x environment.

  • Install the Python libraries in Ec2InstanceMaker/requirements.txt into the freshly created virtual Python environment.

  • Build away!

It is strongly suggested that the reader carefully review the installation documentation (INSTALL.md) to avoid potentially costly and time-consuming mistakes.

Note to DevOps Teams

As noted above, Ec2InstanceMaker is intended to reduce the administrative burden required for DevOps teams to support the diverse compute and storage needs of their stakeholders; conversely, it can empower scientists, engineers, statisticians, and analysts to compute at scale without needing to get assistnace from their Devops team.

  • Ec2InstanceMaker supports the use of private IP addresses for environments that require enhanced security.

    • Deployment of public IP addresses can be disabled by setting --public_ip=false.
    • Please note that if this feature is invoked within a compute environment that does not live in the target VPC, the provisioning process will fail with a "connection refused" error: Error: timeout - last error: dial tcp 172.31.32.161:22: connect: connection refused
    • A more descriptive error will be returned in a future release.
  • Ec2InstanceMaker can deploy into any active VPC that is named.

  • Ec2InstanceMaker does not make any changes to the existing networking environment already present in the operator's AWS account.

    • These tools do not create new VPCs, subnets, Internet or NAT gateways, routes, or Transit Gateways.
    • They do not modify Route53 configurations, change default routes, or otherwise impact or deploy any infrastructure that is not explicitly documented or easily inferred by reviewing the code.
  • Ec2InstanceMaker creates generic IAM roles, policies, and instance templates that are individualized as much as possible for each instance or instance family. By default, Ec2InstanceMaker-spawned instances cannot spwan children.

    • These JSON templates are located in the templates/ subdirectory and contain all required IAM permissions to work with the AWS services listed below:
      • EC2
      • AutoScaling
      • S3
      • SQS
      • SNS
    • If you run into permissions problems building instances or provisioning storage resources, it's usually because of an IAM issue. When speaking with your DevOps professionals, the following options are suggested:
      • Set --iam_json_policy=ExtendedEc2InstancePolicy.json to use the included JSON policy document which permits children instances to be spawned.
      • Work with your DevOps team to construct a custom IAM role that provides appropriate permissions for your environment, then include it by setting --iam_role=$ROLE_NAME when invoking make-instance.py. Please refer to the EXAMPLE_USE_CASES document for additional guidance.
    • DevOps teams should also be aware that additional granular control over the IAM namespace can be realized by setting --iam_name_prefix to a chosen value. This makes it eaiser to incorporate Ec2InstanceMaker into environments that perfer to have users assume a set of standard roles to perform tasks in the AWS environment.

For example:

$ ./make-instance.py -N dev01 -O rmarable -E [email protected] -A us-west-2b --iam_name_prefix=MyEc2IamPrefix

This command will create an EC2 instance role, instance profile, and policy prepended with MyEc2IamPrefix. The user can only create, delete, or modify IAM entities that are prepended with "MyEc2IamPrefix."

Using Ec2InstanceMaker

Ec2InstanceMaker is a collection of scripts and user-configurable templates.

Scripts. Please see below for more details on how the scripts are used.

  • make-instance.py
  • access-instance.py
  • kill-instance.$INSTANCE_NAME.py

Templates. Ec2InstanceMaker provides some generic templates that can be customized to permit more granular control over the IAM EC2 instance policy that is used to create the instance profiles that are created by the toolkit.

  • MinimalEc2InstancePolicy.json is a bare-bones template that allows only EC2 and S3 API calls.
  • GenericEc2InstancePolicy.json provides enough permissions for an EC2 "jumphost" spawned by make-instance.py to in turn create additional instances. In addition to allowing EC2 and S3, it also permits maintenance of EFS and FSx for Lustre file systems, SQS queues, SNS topic administration, IAM role and instance profile maintenance, and access to SSM. However, please note that this template does NOT provide adequate permissions for instances built with Ec2InstanceMzker to spwan children of their own.
  • ExtendedEc2InstancePolicy.json is equivalent to GenericEc2InstancePolicy.json permissions for an EC2 except that it grants Ec2InstanceMaker-spawned instances appropriate permissions to spawn children.
  • Ec2AdminInstancePolicy.json is provides the EC2 instance profile with full adminstrator rights over the AWS account in question. Use this policy judiciously!
  • build_instance.j2 permits the operator to leverage Terraform's post-install hook to perform further configuration of EC2 instances using a shell script.
  • instance_userdata.j2 will allow the operator to leverage EC2 instance userdata to perform additional configuration. Please reference:

https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/ec2-instance-metadata.html#instancedata-add-user-data

Using make-instance.py

make-instance.py builds EC2 instances for a wide variety of use cases.

$ ./make-instance.py -h
usage: make-instance.py [-h] --az AZ --instance_name INSTANCE_NAME
                        --instance_owner INSTANCE_OWNER --instance_owner_email
                        INSTANCE_OWNER_EMAIL
                        [--ansible_verbosity ANSIBLE_VERBOSITY]
                        [--base_os {alinux,alinux2,centos6,centos7,ubuntu1404,ubuntu1604,ubuntu1804,windows2019}]
                        [--count COUNT] [--custom_ami CUSTOM_AMI]
                        [--debug_mode {true,false}]
                        [--ebs_encryption {true,false}]
                        [--ebs_optimized {true,false}]
                        [--ebs_root_volume_iops EBS_ROOT_VOLUME_IOPS]
                        [--ebs_root_volume_size EBS_ROOT_VOLUME_SIZE]
                        [--ebs_root_volume_type {gp2,io1,st1}]
                        [--efs_encryption {true,false}]
                        [--efs_performance_mode {generalPurpose,maxIO}]
                        [--enable_efs {true,false}]
                        [--enable_fsx {true,false}]
                        [--enable_fsx_hydration {true,false}]
                        [--enable_placement_group {true,false}]
                        [--fsx_chunk_size FSX_CHUNK_SIZE]
                        [--fsx_size FSX_SIZE] [--fsx_s3_bucket FSX_S3_BUCKET]
                        [--fsx_s3_path FSX_S3_PATH]
                        [--hyperthreading {true,false}]
                        [--iam_json_policy IAM_JSON_POLICY]
                        [--iam_name_prefix IAM_NAME_PREFIX]
                        [--iam_role IAM_ROLE]
                        [--instance_owner_department {analytics,clinical,commercial,compbio,compchem,datasci,design,development,hpc,imaging,manufacturing,medical,modeling,operations,proteomics,robotics,qa,research,scicomp}]
                        [--request_type {ondemand,spot}]
                        [--instance_type INSTANCE_TYPE]
                        [--prod_level {dev,test,stage,prod}]
                        [--preserve_ami {true,false}]
                        [--preserve_efs {true,false}]
                        [--project_id PROJECT_ID]
                        [--public_ip PUBLIC_IP]`
                        [--security_group SECURITY_GROUP]
                        [--spot_buffer SPOT_BUFFER]
                        [--turbot_account TURBOT_ACCOUNT]
                        [--vpc_name VPC_NAME]

make-instance.py: Command-line interface to build EC2 instances

optional arguments:
  -h, --help            show this help message and exit
  --az AZ, -A AZ        AWS Availability Zone (REQUIRED)
  --instance_name INSTANCE_NAME, -N INSTANCE_NAME
                        name of the instance (REQUIRED)
  --instance_owner INSTANCE_OWNER, -O INSTANCE_OWNER
                        ActiveDirectory username of the instance
                        instance_owner (REQUIRED)
  --instance_owner_email INSTANCE_OWNER_EMAIL, -E INSTANCE_OWNER_EMAIL
                        Email address of the instance instance_owner
                        (REQUIRED)
  --ansible_verbosity ANSIBLE_VERBOSITY, -V ANSIBLE_VERBOSITY
                        Set the Ansible verbosity level (default = none)
  --base_os {alinux,alinux2,centos6,centos7,ubuntu1404,ubuntu1604,ubuntu1804,windows2019}, -B {alinux,alinux2,centos6,centos7,ubuntu1404,ubuntu1604,ubuntu1804,windows2019}
                        instance base operating system (default = alinux2
                        a.k.a. Amazon Linux 2)
  --count COUNT, -C COUNT
                        number of EC2 instances to create (default = 1)
  --custom_ami CUSTOM_AMI
                        ami-id of a custom Amazon Machine Image (default =
                        UNDEFINED)
  --debug_mode {true,false}, -D {true,false}
                        Enable debug mode (default = false)
  --ebs_encryption {true,false}
                        enable EBS encryption (default = false)
  --ebs_optimized {true,false}
                        use optimized EBS volumes (default = yes)
  --ebs_root_volume_iops EBS_ROOT_VOLUME_IOPS
                        amount of provisioned IOPS for the EBS root volume
                        when ebs_root_volume_type=io1 (default = 0)
  --ebs_root_volume_size EBS_ROOT_VOLUME_SIZE
                        EBS volume size in GB (Linux default = 8, Windows
                        default = 30)
  --ebs_root_volume_type {gp2,io1,st1}
                        EBS volume type (default = gp2)
  --efs_encryption {true,false}
                        enable EFS encryption in transit and at rest (default
                        = false)
  --efs_performance_mode {generalPurpose,maxIO}
                        select the EFS performance mode (default =
                        generalPurpose)
  --enable_efs {true,false}
                        Deploy and mount an Elastic File System (EFS) on the
                        instance(s) (default = false)
  --enable_fsx {true,false}
                        Deploy and mount a Lustre (FSxL) file system on the
                        instance(s) (default = false)
  --enable_fsx_hydration {true,false}
                        enable support for hydrating FSxL from S3 (default =
                        false)
  --enable_placement_group {true,false}
                        Place the new instances in an EC2 placement group
                        using the "cluster" strategy (default = false)
  --fsx_chunk_size FSX_CHUNK_SIZE
                        Chunk size (MB) of S3 objects imported into Lustre
                        (default = 1024)
  --fsx_size FSX_SIZE   Lustre file system size in GB - must use multiples of
                        1200 (default = 1200)
  --fsx_s3_bucket FSX_S3_BUCKET
                        Name of an S3 bucket connected to the Lustre file
                        system for this instance (default = UNDEFINED)
  --fsx_s3_path FSX_S3_PATH
                        Path to a folder on s3://fsx_s3_bucket that Lustre
                        will import/export from (default = fsxRoot)
  --hyperthreading {true,false}, -H {true,false}
                        enable Intel Hyperthreading (default = true)
  --iam_json_policy IAM_JSON_POLICY, -J IAM_JSON_POLICY
                        Use a pre-existing JSON policy document in the
                        /templates subdirectory to set permissions for
                        iam_role (default = GenericEc2InstancePolicy.json
  --iam_name_prefix IAM_NAME_PREFIX
                        Provide a prefix for the IAM entities associated with
                        the instance (default = Ec2InstanceMaker)
  --iam_role IAM_ROLE   Apply a pre-existing IAM role to the instance
  --instance_owner_department {analytics,clinical,commercial,compbio,compchem,datasci,design,development,hpc,imaging,manufacturing,medical,modeling,operations,proteomics,robotics,qa,research,scicomp}
                        Department of the instance_owner (default = hpc)
  --request_type {ondemand,spot}
                        choose between ondemand or spot instances (default =
                        ondemand)
  --instance_type INSTANCE_TYPE, -I INSTANCE_TYPE
                        EC2 instance type (default = t2.micro)
  --prod_level {dev,test,stage,prod}
                        Operating stage of the jumphost (default = dev)
  --preserve_ami {true,false}
                        Preserve any AMI image built from the instance(s)
                        post-termination (default = true)
  --preserve_efs {true,false}
                        Preserve the Elastic File System (EFS) created with
                        the instance(s) (default = false)
  --project_id PROJECT_ID, -P PROJECT_ID
                        Project name or ID number (default = UNDEFINED)
  --public_ip PUBLIC_IP, -p PUBLIC_IP
                        Attach a public IP address to the instance(s) (default
                        = true)
  --security_group SECURITY_GROUP, -S SECURITY_GROUP
                        Primary security group for the EC2 instance (default =
                        ec2instancemaker_sg)
  --spot_buffer SPOT_BUFFER
                        pricing buffer to protect from Spot market
                        fluctuations: spot_price = spot_price +
                        spot_price*spot_buffer
  --turbot_account TURBOT_ACCOUNT, -T TURBOT_ACCOUNT
                        Turbot account ID (default = DISABLED)
  --vpc_name VPC_NAME   Name of the VPC (default = vpc_default)

Building Instances

The minimum required arguments are the Availability Zone, the instance owner's username and email address, and the instance name. All other parameters will fall back to the default of a single ondemand t2.micro instance running Amazon Linux 2 with an 8 GB EBS gp2 unencrypted volume as the root device, using the supplied JSON policy document to generate an IAM instance profile providing EC2 and S3 access:

$ ./make-instance.py -A us-east-2a -N ec2-testinstance01 -O rmarable -E [email protected]

To build a Windows instance using (mostly) default values:

./make-instance.py -N dev01 -O rmarable -E [email protected] -A us-east-1b -I t3a.micro -B windows2019

If the user provides illegal parameter values or if any of the required AWS resources fail to deploy, the script will loudly echo an appropriate error before aborting. In the example below, the user attempts to build an EBS root device that is larger than 16 TB:

$ ./make-instance.py -A us-east-2a -N ec2-testinstance01 -O rmarable -E [email protected] --ebs_root_volume_size=16049311

Performing parameter validation...

Selected EC2 instance type: t2.micro
** WARNING **
t2.micro does not support EBS optimization!
Disabling ebs_optimization for: ec2-testinstance01

** ERROR **
Maximum allowed EBS volume size is 16 TB (16000 GB)!

Please resolve this error and retry the instance build.
Aborting...

Accessing Instances

access-instance.py provides an easy mechanism for making SSH connections to multiple EC2 Linux instances. When working with Windows EC2 instances, this script will provide the decrypted Administrator password and IP address which can then be pasted into a Remote Desktop Client within an easy-to-parse table.

For a single Linux instance:

$ ./access_instance.py -N dev01
Last login: Thu Jun 13 03:55:11 2019 from 72-21-196-65.amazon.com

       __|  __|_  )
       _|  (     /   Amazon Linux 2 AMI
      ___|\___|___|

https://aws.amazon.com/amazon-linux-2/
[ec2-user@ip-172-31-6-21 ~]$ exit
logout
Connection to 3.215.135.101 closed.

Reconnect to dev01 by running this command:

$ ./access_instance.py -N dev01

For a single Windows instance:

Access the new instance via Windows Remote Desktop with this information:

+---------------+---------------+----------------------------------+
| Instance Name |   IP Address  |      Adminstrator Password       |
+---------------+---------------+----------------------------------+
|     dev01     | 34.201.49.101 | K?Uf.@Roy-?D-W-?GPDW@4_BaT%=?EiD |
+---------------+---------------+----------------------------------+

Reprint this table:
$ ./access-instance.py -N dev01

When working with Linux instance families, access_instance.py provides an interactive menu allowing the user to select the specific instance of interest:

$ ./access_instance.py -N fam01

+------+---------------+----------------+
| Item | Instance Name |   IP Address   |
+------+---------------+----------------+
|  1   |    fam01-0    | 18.204.42.129  |
|  2   |    fam01-1    |  34.237.2.35   |
|  3   |    fam01-2    |  3.83.36.203   |
|  4   |    fam01-3    |  3.80.159.180  |
|  5   |    fam01-4    | 18.207.181.36  |
|  6   |    fam01-5    |  3.214.144.61  |
|  7   |    fam01-6    | 18.232.133.187 |
|  8   |    fam01-7    | 18.209.237.152 |
|  9   |    fam01-8    | 18.209.213.133 |
|  10  |    fam01-9    |  3.80.163.177  |
+------+---------------+----------------+

Select an instance to access using SSH:
4

Opening an SSH connection to: fam01-3

The authenticity of host '3.80.159.180 (3.80.159.180)' can't be established.
ECDSA key fingerprint is SHA256:K0pbmmEPLcAhltTT5kqYcEUNJiamr+3J+gzjpvZsdoI.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '3.80.159.180' (ECDSA) to the list of known hosts.
Last login: Thu Jun 13 13:44:17 2019 from 72-21-196-66.amazon.com
[centos@ip-172-31-5-254 ~]$ exit
logout
Connection to 3.80.159.180 closed.

Reconnect to fam01-3 by running this command:

$ ./access_instance.py -N fam01

The "-m" switch can be used to access a specific instance as it is listed in the table. This enables access_instance.py to be used for other automated tasks.

$ ./access_instance.py -N fam01 -m 3

When working with multiple Windows instances, a menu displaying the decrypted Administrator password and IP address of each instance is dumped to the console. This data can be pasted into an RDC client to access the instance of choice:

$ ./access_instance.py -N dev01
Access the new instance family members with Windows Remote Desktop:

+---------------+---------------+----------------------------------+
| Instance Name |   IP Address  |      Adminstrator Password       |
+---------------+---------------+----------------------------------+
|    dev01-0    | 3.210.201.142 | GTm.%A8%NARIe$&ax=sWojSRKxU.LIRB |
|    dev01-1    |  3.216.27.77  | uMP)sOvC2w7WXLi3h3L2%9VjI5Ovwo7c |
|    dev01-2    |  34.237.0.213 | 9T2cye$ytrEp9)niIlNv@@P;ORu8f&pu |
+---------------+---------------+----------------------------------+

Reprint this table:
$ ./access_instance -N dev01

Destroying Instances

kill-instance.$INSTANCE_NAME.sh is a personalized script designed to terminate specific EC2 instances, EC2 security groups, IAM entities, and any associated storage resources that were tagged with the instance_serial_nunber. It is generated by make-instance.py and will delete itself when all tagged instances and resources are terminated.

To invoke:

$ ./kill-instance.dev01.sh

EC2 instance "dev01" is marked for termination.

################################################################################
################  Please type CTRL-C within 5 seconds to abort  ################
################################################################################

Destroying instance: dev01

aws_instance.dev01[0]: Refreshing state... [id=i-02021ce214305ce85]
aws_instance.dev01[0]: Destroying... [id=i-02021ce214305ce85]
aws_instance.dev01[0]: Still destroying... [id=i-02021ce214305ce85, 10s elapsed]
aws_instance.dev01[0]: Still destroying... [id=i-02021ce214305ce85, 20s elapsed]
aws_instance.dev01[0]: Still destroying... [id=i-02021ce214305ce85, 30s elapsed]
aws_instance.dev01[0]: Destruction complete after 31s

Destroy complete! Resources: 1 destroyed.
Deleted EC2 keypair: dev01-53522312062019_us-east-1
Deleted SSH keypair file: /Users/rmarable/src/public/Ec2InstanceMaker/instance_data/dev01/dev01-53522312062019_us-east-1.pem
Deleted directory: /Users/rmarable/src/public/Ec2InstanceMaker/instance_data/dev01
Deleted SNS topic: arn:aws:sns:us-east-1:147724377207:Ec2_Instance_SNS_Alerts_dev01-53522312062019
Deleted IAM EC2 policy: Ec2InstanceMaker-policy-dev01-53522312062019
Deleted IAM EC2 instance profile: Ec2InstanceMaker-profile-dev01-53522312062019
Deleted IAM role: Ec2InstanceMaker-role-dev01-53522312062019
Deleted file: ./vars_files/dev01.yml
Deleted file: ./active_instances/dev01.serial
Deleted file: kill-instance.dev01.sh

###############################################################################
##           Finished deleting EC2 instance: dev01
###############################################################################

Exiting...

Instance Customization

The basic post-installation shell script performs a systems package update and inserts a 45-second keep-alive interval to prevent SSH logouts from affecting any ongoing interactive instance activity.

The instance userdata template disables Intel HyperThreading if --enable_hyperthreading=false and modifies the root volume on CentOS 6 instances so it can be expanded up to 16 TB without user intervention.

Ec2InstanceMaker also permits additional user customization by simply pasting the desired commands into templates/custom_user_script.j2 beneath the obvious comment:

########################################################
## Paste your custom script actions below this comment #
########################################################

This provides operators and DevOps professionals with a powerful mechanism for quickly building and distributing "golden" AMI images that can be widely distributed throughout an enterprise, or for customized images that can be specifically tailored by individuals or teams. Please see "Working with Custom AMIs" and "Building New AMIs with the build-ami Script" for additional details.

Please note that additional customization of Windows instances can only be performed through the userdata template (templates/instance_userdata.j2).

Support for joining a Windows Active Directory domain and mounting FSx for Windows storage will be provided in a future release. Support for PowerShell scripts may also be provided in subsequent releases.

Using EFS

EFS support can be enabled by setting --enable_efs=true when the instance is first constructed:

$ ./make-instance.py -A us-east-1a -O rmarable -E [email protected] -N dev01 --request_type=spot --count=3 --enable_efs=true

This will create a new EFS file system that shares tags and its lifecycle with instance family "dev01."

Support for "general purpose" and "maximum IO" modes can be selected through the efs_performance_mode switch:

  --efs_performance_mode {generalPurpose,maxIO}
                        select the EFS performance mode (default =
                        generalPurpose)

To encrypt EFS traffic at rest and in flight, set efs_encryption=true. Note that encryption in transit is not supported under centos6 or ubuntu1404.

Building an EFS file system will add an extra three minutes to the creation process time.

Using FSx for Lustre

To add an FSx for Lustre file system that shares both the instance tag collection and lifecycle, set enable_fsx=true when the instance is first created. The example below will attach a 1,200 GB Lustre file system mounted at /fsx to a new Amazon Linux 2 instance:

$ ./make-instance.py -A us-east-1a -O rmarable -E [email protected] -N dev01 --count=3 --request_type=spot --enable_fsx=true

The size of the file system is controlled with the fsx_size flag. Lustre file systems must use multiples of 1,200 GB or an error will be returned. Please refer to the product announcement: https://amzn.to/2m25H5j

Hydration of an FSX file system from an S3 bucket is supported by setting enable_fsx_hydration=true, designating an existing S3 bucket (fsx_s3_bucket) and path (fsx_s3_path), and optionally choosing a "chunk" size (fsx_chunk_size). The bucket and path, if provided, must exist or an error will be returned.

This example will create a 1.2 TB Lustre file system that will hydrate to and from s3://rmarable-hydration-test/import mounted at /fsx on an Amazon Linux 2 spot instance family called "dev01."

./make-instance.py -A us-east-1a -O rmarable -E [email protected] -N dev01 --count=3 --request_type=spot --enable_fsx=true --fsx_s3_bucket=rmarable-hydration-test --fsx_s3_path=import --enable_fsx_hydration=true

Please note that the size of all Lustre file systems must be provisioned in multples of 1,200 TB. The make-instance.py script will return an error if this step is ignored.

To faciliate pushing data in an out of the bucket from Lustre, please use the following shell scripts which will be automatically created and stored in /usr/local/bin on all instance family members:

Import S3 from Lustre: this script will push data from S3 into the FSx layer with a transfer rate that is 1/2 that of the Luster file system: $ /usr/local/bin/import-s3-to-lustre.sh

Export Lustre to S3: this script will push data from the FSx layer into S3: $ /usr/local/bin/export-lustre-to-s3.sh

Check export status: this script will permit you to track the progress of an export Lustre-to-S3 tasks: $ /usr/local/bin/check-lustre-export-progress.sh

For more information on Lustre hydration to and from S3, please refer to the AWS public documentation on using FSx with durable data repositories:

https://docs.aws.amazon.com/fsx/latest/LustreGuide/fsx-data-repositories.html

Support for attaching FSx for Windows file systems to EC2 instances running Windows Server 2019 may be provided in a future release.

EC2 Placement Groups

Ec2InstanceMaker supports the use of EC2 placement groups by setting --enable_placement_group=true. The strategies supported currently are "cluster' and "spread." Future releases will support "partition" placement groups with additional control over the number of allowed partitions through command line switches.

The placement group will be named "ec2pg-$INSTANCE_SERIAL_NUMBER" and is tied to the instance life cycle.

The script will abort if the operator attempts to place a single instance into a placement group.

Working with Custom AMIs

Ec2InstanceMaker supports building new instances from custom AMIs by using the --custom_ami switch. If the custom_ami is not found, the script will return an error.

Launching Instances Using Docker

Ec2InstanceMaker supports launching new EC2 instances from a Docker container.

Please refer to "Launching Instances Using Docker" in the INSTALL document.

Building New AMIs Using the build-ami Script

Ec2InstanceMaker provides a customized build script for each instance_serial_number which permits the operator to create and register a new AMI image. By including custom code in the build-instance.j2 template, users now have a powerful mechanism for quickly customizing AMIs without requiring DevOps assistance. Conversely, DevOps professionals now have a means to disseminate curated "golden" AMIs throughout their environment.

To build a new AMI:

$ ./build-ami.$INSTANCE_NAME.sh

By default, any AMI created by this script will be preserved after the instance (or instance family) is terminated.

To modify this behavior, the instance(s) must be built by setting preserve_ami=false like this:

./make-instance.py -O rmarable -E [email protected] -N dev01 -A us-east-1a --preserve_ami=false

This is not a recommended best practice and should only be enabled when testing.

Troubleshooting

  • Python version 3.6 or greater is required by this software. Additionally, you must install the required libraries in requirements.txt. If any of these components are missing, you will observe missing Python module errors:
ModuleNotFoundError: No module named boto3'
  • Ansible and Terraform must also be present in order for the scripts in this toolkit to operate as expected. If either of these applications are missing from the installing user's path, make-instance.py will return an "application is missing" error:
$ ./make-instance.py -N dev01 -O rmarable -E [email protected] -A us-east-1b -I t3.micro -C 3 --request_type=spot

** ERROR **
Terraform is missing! Please visit: https://www.terraform.io/downloads

Please resolve this error and retry the instance build.
Aborting...
  • CentOS and Ubuntu require subscribing to the appropriate operating system channel in the AWS Marketplace:
Error: Error launching source instance: OptInRequired: In order to use this AWS Marketplace product you need to accept terms and subscribe. To do so please visit https://aws.amazon.com/marketplace/pp?sku=a1rz1wghrw6x9gn14lyded00r

If you observe this error while attempting to build an EC2 instance, please follow the guidelines provided in the message output to subscribe to the OS channel through the AWS Marketplace.

  • Ec2InstanceMaker supports EBS encryption but does not yet provide a mechanism for building and attaching multiple EBS volumes to an EC2 instance during the installation process, which would subsequently be encrypted when --enable_ebs_encryption=true. This feature will be provided in a future release.

  • Encryption of root volumes during the instance installation process is now supported by Terraform. When the instance is finished building, build a new encrypted AMI with the included build-ami script using the symlink in the top-level SRC tree.

    • Note the resulting AMI ID value and use it to launch subsequent instances with "--custom_ami=$AMI_ID".

You can also enable EBS encryption by default for all instances in the account by reviewing this link to the AWS public documentation:

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default

Please be advised that this is a per-Region setting that can't be disabled on a per-volume or snapshot basis. Furthermore, you will not be able to launch instances that do not support encryption within the region in question. This link on the AWS public documentation summarizes the instances that can be launched within the region in question for that account:

https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances

  • Please be advised that EFS encryption in transit is not supported for CentOS 6 or Ubuntu 14.04 LTS.

    • centos6 ships with openssl-1.0.1e-57, which is too old to support to support TLS with EFS. There are no officially supported openssl packages beyond this version.

    • ubuntu1404 does not seem to support building the native Debian package of amazon-efs-utils.

    • EFS encryption in transit for these operating systems may be provided in a subsequent feature release.

  • If the instance(s) cannot be built due to a lack of spot capacity, Terraform will return a "capacity-not-available" error. To resolve this, try increasing the spot_buffer or using ondemand instead.

ec2instancemaker's People

Contributors

rmarable avatar pmcbrien avatar chris7 avatar

Stargazers

 avatar Aric LeDell avatar  avatar Matt Tunny avatar Geoff C avatar Ed S avatar Robert Barrimond avatar

Watchers

 avatar

Forkers

chris7 pmcbrien

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.