本文整理汇总了Python中appscale.appscale_logger.AppScaleLogger.log方法的典型用法代码示例。如果您正苦于以下问题:Python AppScaleLogger.log方法的具体用法?Python AppScaleLogger.log怎么用?Python AppScaleLogger.log使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在类appscale.appscale_logger.AppScaleLogger
的用法示例。
在下文中一共展示了AppScaleLogger.log方法的15个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Python代码示例。
示例1: create_security_group
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def create_security_group(self, parameters, group):
"""Creates a new security group in AWS with the given name.
Args:
parameters: A dict that contains the credentials necessary to authenticate
with AWS.
group: A str that names the group that should be created.
Raises:
AgentRuntimeException: If the security group could not be created.
"""
AppScaleLogger.log('Creating security group: {0}'.format(group))
conn = self.open_connection(parameters)
retries_left = self.SECURITY_GROUP_RETRY_COUNT
while retries_left:
try:
conn.create_security_group(group, 'AppScale security group')
except EC2ResponseError:
pass
try:
conn.get_all_security_groups(group)
return
except EC2ResponseError:
pass
time.sleep(self.SLEEP_TIME)
retries_left -= 1
raise AgentRuntimeException("Couldn't create security group with " \
"name {0}".format(group))
示例2: get_optimal_spot_price
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def get_optimal_spot_price(self, conn, instance_type, zone):
"""
Returns the spot price for an EC2 instance of the specified instance type.
The returned value is computed by averaging all the spot price history
values returned by the back-end EC2 APIs and incrementing the average by
extra 10%.
Args:
conn: A boto.EC2Connection that can be used to communicate with AWS.
instance_type: A str representing the instance type whose prices we
should speculate for.
zone: A str representing the availability zone that the instance will
be placed in.
Returns:
The estimated spot price for the specified instance type, in the
specified availability zone.
"""
end_time = datetime.datetime.now()
start_time = end_time - datetime.timedelta(days=7)
history = conn.get_spot_price_history(start_time=start_time.isoformat(),
end_time=end_time.isoformat(), product_description='Linux/UNIX',
instance_type=instance_type, availability_zone=zone)
var_sum = 0.0
for entry in history:
var_sum += entry.price
average = var_sum / len(history)
bid_price = average * 1.10
AppScaleLogger.log('The average spot instance price for a {0} machine is'\
' {1}, and 10% more is {2}'.format(instance_type, average, bid_price))
return bid_price
示例3: handle_failure
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def handle_failure(self, msg):
""" Log the specified error message and raise an AgentRuntimeException
Args:
msg: An error message to be logged and included in the raised exception.
Raises:
AgentRuntimeException Contains the input error message.
"""
AppScaleLogger.log(msg)
raise AgentRuntimeException(msg)
示例4: does_image_exist
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def does_image_exist(self, parameters):
""" Queries Amazon EC2 to see if the specified image exists.
Args:
parameters: A dict that contains the machine ID to check for existence.
Returns:
True if the machine ID exists, False otherwise.
"""
try:
conn = self.open_connection(parameters)
image_id = parameters[self.PARAM_IMAGE_ID]
conn.get_image(image_id)
AppScaleLogger.log('Machine image {0} does exist'.format(image_id))
return True
except boto.exception.EC2ResponseError:
AppScaleLogger.log('Machine image {0} does not exist'.format(image_id))
return False
示例5: configure_instance_security
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def configure_instance_security(self, parameters):
"""
Setup EC2 security keys and groups. Required input values are read from
the parameters dictionary. More specifically, this method expects to
find a 'keyname' parameter and a 'group' parameter in the parameters
dictionary. Using these provided values, this method will create a new
EC2 key-pair and a security group. Security group will be granted permission
to access any port on the instantiated VMs. (Also see documentation for the
BaseAgent class)
Args:
parameters: A dictionary of parameters.
"""
keyname = parameters[self.PARAM_KEYNAME]
group = parameters[self.PARAM_GROUP]
AppScaleLogger.log("Verifying that keyname {0}".format(keyname) + \
" is not already registered.")
conn = self.open_connection(parameters)
if conn.get_key_pair(keyname):
self.handle_failure("SSH keyname {0} is already registered. Please " \
"change the 'keyname' specified in your AppScalefile to a different " \
"value, or erase it to have one automatically generated for you." \
.format(keyname))
security_groups = conn.get_all_security_groups()
for security_group in security_groups:
if security_group.name == group:
self.handle_failure("Security group {0} is already registered. Please" \
" change the 'group' specified in your AppScalefile to a different " \
"value, or erase it to have one automatically generated for you." \
.format(group))
AppScaleLogger.log("Creating key pair: {0}".format(keyname))
key_pair = conn.create_key_pair(keyname)
ssh_key = '{0}{1}.key'.format(LocalState.LOCAL_APPSCALE_PATH, keyname)
LocalState.write_key_file(ssh_key, key_pair.material)
self.create_security_group(parameters, group)
self.authorize_security_group(parameters, group, from_port=1, to_port=65535,
ip_protocol='udp', cidr_ip='0.0.0.0/0')
self.authorize_security_group(parameters, group, from_port=1, to_port=65535,
ip_protocol='tcp', cidr_ip='0.0.0.0/0')
self.authorize_security_group(parameters, group, from_port=-1, to_port=-1,
ip_protocol='icmp', cidr_ip='0.0.0.0/0')
return True
示例6: does_disk_exist
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def does_disk_exist(self, parameters, disk_name):
""" Queries Amazon EC2 to see if the specified EBS volume exists.
Args:
parameters: A dict that contains the credentials needed to authenticate
with AWS.
disk_name: A str naming the EBS volume to check for existence.
Returns:
True if the named EBS volume exists, and False otherwise.
"""
conn = self.open_connection(parameters)
try:
conn.get_all_volumes([disk_name])
AppScaleLogger.log('EBS volume {0} does exist'.format(disk_name))
return True
except boto.exception.EC2ResponseError:
AppScaleLogger.log('EBS volume {0} does not exist'.format(disk_name))
return False
示例7: does_zone_exist
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def does_zone_exist(self, parameters):
""" Queries Amazon EC2 to see if the specified availability zone exists.
Args:
parameters: A dict that contains the availability zone to check for
existence.
Returns:
True if the availability zone exists, and False otherwise.
"""
try:
conn = self.open_connection(parameters)
zone = parameters[self.PARAM_ZONE]
conn.get_all_zones(zone)
AppScaleLogger.log('Availability zone {0} does exist'.format(zone))
return True
except boto.exception.EC2ResponseError:
AppScaleLogger.log('Availability zone {0} does not exist'.format(zone))
return False
示例8: configure_instance_security
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def configure_instance_security(self, parameters):
""" Creates a GCE network and firewall with the specified name, and opens
the ports on that firewall as needed for AppScale.
We expect both the network and the firewall to not exist before this point,
to avoid accidentally placing AppScale instances from different deployments
in the same network and firewall (thus enabling them to see each other's web
traffic).
Args:
parameters: A dict with keys for each parameter needed to connect to
Google Compute Engine, and an additional key indicating the name of the
network and firewall that we should create in GCE.
Returns:
True, if the named network and firewall was created successfully.
Raises:
AgentRuntimeException: If the named network or firewall already exist in
GCE.
"""
AppScaleLogger.log("Verifying that SSH key exists locally")
keyname = parameters[self.PARAM_KEYNAME]
private_key = LocalState.LOCAL_APPSCALE_PATH + keyname
public_key = private_key + ".pub"
if os.path.exists(private_key) or os.path.exists(public_key):
raise AgentRuntimeException("SSH key already found locally - please " +
"use a different keyname")
LocalState.generate_rsa_key(keyname, parameters[self.PARAM_VERBOSE])
ssh_key_exists, all_ssh_keys = self.does_ssh_key_exist(parameters)
if not ssh_key_exists:
self.create_ssh_key(parameters, all_ssh_keys)
if self.does_network_exist(parameters):
raise AgentRuntimeException("Network already exists - please use a " + \
"different group name.")
if self.does_firewall_exist(parameters):
raise AgentRuntimeException("Firewall already exists - please use a " + \
"different group name.")
network_url = self.create_network(parameters)
self.create_firewall(parameters, network_url)
示例9: authorize_security_group
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def authorize_security_group(self, parameters, group, from_port, to_port,
ip_protocol, cidr_ip):
"""Opens up traffic on the given port range for traffic of the named type.
Args:
parameters: A dict that contains the credentials necessary to authenticate
with AWS.
group: A str that names the group whose ports should be opened.
from_port: An int that names the first port that access should be allowed
on.
to_port: An int that names the last port that access should be allowed on.
ip_protocol: A str that indicates if TCP, UDP, or ICMP traffic should be
allowed.
cidr_ip: A str that names the IP range that traffic should be allowed
from.
Raises:
AgentRuntimeException: If the ports could not be opened on the security
group.
"""
AppScaleLogger.log('Authorizing security group {0} for {1} traffic from ' \
'port {2} to port {3}'.format(group, ip_protocol, from_port, to_port))
conn = self.open_connection(parameters)
retries_left = self.SECURITY_GROUP_RETRY_COUNT
while retries_left:
try:
conn.authorize_security_group(group, from_port=from_port,
to_port=to_port, ip_protocol=ip_protocol, cidr_ip=cidr_ip)
except EC2ResponseError:
pass
try:
group_info = conn.get_all_security_groups(group)[0]
for rule in group_info.rules:
if int(rule.from_port) == from_port and int(rule.to_port) == to_port \
and rule.ip_protocol == ip_protocol:
return
except EC2ResponseError:
pass
time.sleep(self.SLEEP_TIME)
retries_left -= 1
raise AgentRuntimeException("Couldn't authorize {0} traffic from port " \
"{1} to port {2} on CIDR IP {3}".format(ip_protocol, from_port, to_port,
cidr_ip))
示例10: detach_disk
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def detach_disk(self, parameters, disk_name, instance_id):
""" Detaches the EBS mount specified in disk_name from the named instance.
Args:
parameters: A dict with keys for each parameter needed to connect to AWS.
disk_name: A str naming the EBS volume to detach.
instance_id: A str naming the id of the instance that the disk should be
detached from.
Returns:
True if the disk was detached, and False otherwise.
"""
conn = self.open_connection(parameters)
try:
conn.detach_volume(disk_name, instance_id, device='/dev/sdc')
return True
except boto.exception.EC2ResponseError:
AppScaleLogger.log("Could not detach volume with name {0}".format(
disk_name))
return False
示例11: does_address_exist
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def does_address_exist(self, parameters):
""" Queries Amazon EC2 to see if the specified Elastic IP address has been
allocated with the given credentials.
Args:
parameters: A dict that contains the Elastic IP to check for existence.
Returns:
True if the given Elastic IP has been allocated, and False otherwise.
"""
try:
conn = self.open_connection(parameters)
elastic_ip = parameters[self.PARAM_STATIC_IP]
conn.get_all_addresses(elastic_ip)
AppScaleLogger.log('Elastic IP {0} can be used for this AppScale ' \
'deployment.'.format(elastic_ip))
return True
except boto.exception.EC2ResponseError:
AppScaleLogger.log('Elastic IP {0} does not exist.'.format(elastic_ip))
return False
示例12: does_zone_exist
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def does_zone_exist(self, parameters):
"""
Queries Eucalyptus to see if the specified availability zone exists.
Args:
parameters: A dict that contains the zone to check for existence.
Returns:
True if the availability zone exists, False otherwise.
"""
# Note that we can't use does_zone_exist in EC2Agent. There, if the image
# doesn't exist, it throws an EC2ResponseError, but in Eucalyptus, it
# doesn't (and returns None instead).
conn = self.open_connection(parameters)
zone = parameters[self.PARAM_ZONE]
if conn.get_all_zones(zone):
AppScaleLogger.log('Availability zone {0} does exist'.format(zone))
return True
else:
AppScaleLogger.log('Availability zone {0} does not exist'.format(zone))
return False
示例13: cleanup_state
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def cleanup_state(self, parameters):
""" Removes the keyname and security group created during this AppScale
deployment.
Args:
parameters: A dict that contains the keyname and security group to delete.
"""
AppScaleLogger.log("Deleting keyname {0}".format(
parameters[self.PARAM_KEYNAME]))
conn = self.open_connection(parameters)
conn.delete_key_pair(parameters[self.PARAM_KEYNAME])
AppScaleLogger.log("Deleting security group {0}".format(
parameters[self.PARAM_GROUP]))
while True:
try:
conn.delete_security_group(parameters[self.PARAM_GROUP])
return
except EC2ResponseError:
time.sleep(5)
示例14: stop_instances
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def stop_instances(self, parameters):
"""
Stop one of more EC2 instances. The input instance IDs are
fetched from the 'instance_ids' parameters in the input map. (Also
see documentation for the BaseAgent class)
Args:
parameters: A dictionary of parameters.
"""
instance_ids = parameters[self.PARAM_INSTANCE_IDS]
conn = self.open_connection(parameters)
conn.stop_instances(instance_ids)
AppScaleLogger.log('Stopping instances: '+' '.join(instance_ids))
if not self.wait_for_status_change(parameters, conn, 'stopped',
max_wait_time=120):
AppScaleLogger.log("re-stopping instances: "+' '.join(instance_ids))
conn.stop_instances(instance_ids)
if not self.wait_for_status_change(parameters, conn, 'stopped',
max_wait_time=120):
self.handle_failure("ERROR: could not stop instances: " + \
' '.join(instance_ids))
示例15: terminate_instances
# 需要导入模块: from appscale.appscale_logger import AppScaleLogger [as 别名]
# 或者: from appscale.appscale_logger.AppScaleLogger import log [as 别名]
def terminate_instances(self, parameters):
"""
Terminate one of more EC2 instances. The input instance IDs are
fetched from the 'instance_ids' parameters in the input map. (Also
see documentation for the BaseAgent class)
Args:
parameters: A dictionary of parameters.
"""
instance_ids = parameters[self.PARAM_INSTANCE_IDS]
conn = self.open_connection(parameters)
conn.terminate_instances(instance_ids)
AppScaleLogger.log('Terminating instances: ' + ' '.join(instance_ids))
if not self.wait_for_status_change(parameters, conn, 'terminated',
max_wait_time=120):
AppScaleLogger.log("re-terminating instances: " + ' '.join(instance_ids))
conn.terminate_instances(instance_ids)
if not self.wait_for_status_change(parameters, conn, 'terminated',
max_wait_time=120):
self.handle_failure("ERROR: could not terminate instances: " + \
' '.join(instance_ids))
# Sending a second terminate to a terminated instance to remove it
# from the system (ie no more in describe-instances). This helps when
# bringing deployments up and down frequently and instances are still
# associated with keyname (although they are terminated).
AppScaleLogger.log("Removing terminated instances: " + ' '.join(instance_ids))
conn.terminate_instances(instance_ids)