Ejemplo n.º 1
0
def send_ok():
	sns =boto.sns.connect_to_region('ap-northeast-1')
	topics = sns.get_all_topics()["ListTopicsResponse"]["ListTopicsResult"]["Topics"]
	mytopic  = topics[0]
	msg = u"Boss:\n  Everything is ready !"
	print datetime.now().month, datetime.now().day
	msg+=u'\n\n\n\n\n'+ history.history(datetime.now().month,datetime.now().day).string
	subj = "成功完成等保申报任务"
	res = sns.publish(mytopic['TopicArn'], msg, subj)
Ejemplo n.º 2
0
def send_ok():
    sns = boto.sns.connect_to_region('ap-northeast-1')
    topics = sns.get_all_topics(
    )["ListTopicsResponse"]["ListTopicsResult"]["Topics"]
    mytopic = topics[0]
    msg = u"Boss:\n  Everything is ready !"
    print datetime.now().month, datetime.now().day
    msg += u'\n\n\n\n\n' + history.history(datetime.now().month,
                                           datetime.now().day).string
    subj = "成功完成等保申报任务"
    res = sns.publish(mytopic['TopicArn'], msg, subj)
Ejemplo n.º 3
0
def get_sns_topics(region):
    # SNS topic policies
    verbose("Getting SNS topic policies:")
    sns = boto.sns.connect_to_region(region)
    topic_info = []
    topics = sns.get_all_topics()
    topics = topics["ListTopicsResponse"]["ListTopicsResult"]["Topics"]
    for topic in topics:
        policy = sns.get_topic_attributes(topic["TopicArn"])
        policy = policy["GetTopicAttributesResponse"]["GetTopicAttributesResult"]["Attributes"]["Policy"]
        topic_info.append(config_line_policy(region + " sns:topicpolicy", topic["TopicArn"], "", policy))

    return sorted(topic_info)
Ejemplo n.º 4
0
def get_sns_topics(region):
    # SNS topic policies
    verbose("Getting SNS topic policies:")
    sns = boto.sns.connect_to_region(region,
 aws_access_key_id=assume_role.credentials.access_key,
 aws_secret_access_key=assume_role.credentials.secret_key,
 security_token=assume_role.credentials.session_token)
    topic_info = []
    topics = sns.get_all_topics()
    topics = topics["ListTopicsResponse"]["ListTopicsResult"]["Topics"]
    for topic in topics:
        policy = sns.get_topic_attributes(topic["TopicArn"])
        policy = policy["GetTopicAttributesResponse"]["GetTopicAttributesResult"]["Attributes"]["Policy"]
        topic_info.append(config_line_policy(region + " sns:topicpolicy", topic["TopicArn"], "", policy))

    return sorted(topic_info)
Ejemplo n.º 5
0
def setAlarm():	
	#An SNS connection object is created by passing the region, key and secret key to the connection_to_region() method
	sns = boto.sns.connect_to_region('eu-west-1',aws_access_key_id=key_id, aws_secret_access_key=secret_key )
	#An cloudwatch connection object is created by passing the region, key and secret key to the connection_to_region() method
	cw = boto.ec2.cloudwatch.connect_to_region("eu-west-1", aws_access_key_id=key_id, aws_secret_access_key=secret_key)
	
	print "\nEnabling Cloudwatch monitoring on running instances..\n"
	
	#Invoke the get_all_topics method to return a dictionary containing all topic arns on the account
	topics = sns.get_all_topics()
	
	#Get the first [0] topic arm from the dictionary
	topic = topics[u'ListTopicsResponse']['ListTopicsResult']['Topics'][0]['TopicArn']
	
	emailAddr = raw_input("Please enter an email address to receive alarm notifications: ")
	
	#emailAddr = "*****@*****.**" 
	
	print "\nSNS email address set to %s\n" % emailAddr	
	#Iterate through the list of reservation objects returned by get_all_reservations()
	#This method returns a list of all EC2 instance objects
	for reservation in conn.get_all_reservations():
		#iterate through all instances in reservation
		for instance in reservation.instances:	
			#Set boolean to alert use if no running instances found
			any_running = False
			
			#for any instances that have their state set to running			
			if instance.state == u'running':
				#Call the monitor_instance method on the EC2 connection object with the specified instance id to enable monitoring
				conn.monitor_instance(instance.id)
				
				alarm_name = 'CPU Utilization < 40 for instance: %s' %instance.id 
				#Set the dimensions for the alarm using the current instance id
				alarm_dimensions = {"InstanceId": instance.id}		
				#Set up the alarm by passing in relevant arguments to the Metric alarm method
				#Notable arguments would be threshold being the % to check against and dimensions being the instances to activate the alarm on
				alarm = MetricAlarm(name = alarm_name, comparison='<', threshold=40, period=300, evaluation_periods=2,namespace='AWS/EC2', metric='CPUUtilization', statistic='Average', alarm_actions=[topic], dimensions = alarm_dimensions)
				#Create the alarm
				cw.create_alarm(alarm)
				print "Alarm set for instance: %s" % instance.id
				#Subscribe to the alarm using the specified email address and the email protocol
				sns.subscribe(topic, "email", emailAddr)
				any_running = True;
			if not any_running:
				print "\nNo running instances found. No alarm set."
Ejemplo n.º 6
0
def setAlarm():
    sns = boto.sns.connect_to_region('eu-west-1',
                                     aws_access_key_id=key_id,
                                     aws_secret_access_key=secret_key)
    cw = boto.ec2.cloudwatch.connect_to_region(
        "eu-west-1",
        aws_access_key_id=key_id,
        aws_secret_access_key=secret_key)

    print "\nEnabling Cloudwatch monitoring on running instances..\n"

    topics = sns.get_all_topics()

    topic = topics[u'ListTopicsResponse']['ListTopicsResult']['Topics'][0][
        'TopicArn']

    emailAddr = raw_input(
        "Please enter an email address to receive alarm notifications: ")

    print "\nSNS email address set to %s\n" % emailAddr
    any_running = False
    for reservation in conn.get_all_reservations():
        for instance in reservation.instances:
            if instance.state == u'running':
                any_running = True
                conn.monitor_instance(instance.id)

                alarm_name = 'CPU Utilization < 40 for instance: %s' % instance.id
                alarm_dimensions = {"InstanceId": instance.id}
                alarm = MetricAlarm(name=alarm_name,
                                    comparison='<',
                                    threshold=40,
                                    period=300,
                                    evaluation_periods=2,
                                    namespace='AWS/EC2',
                                    metric='CPUUtilization',
                                    statistic='Average',
                                    alarm_actions=[topic],
                                    dimensions=alarm_dimensions)
                cw.create_alarm(alarm)
                print "Alarm set for instance: %s" % instance.id
                sns.subscribe(topic, "email", emailAddr)
        if not any_running:
            print "\nNo running instances found. No alarm set."
Ejemplo n.º 7
0
def get_sns_topics(region):
    # SNS topic policies
    verbose("Getting SNS topic policies:")
    sns = boto.sns.connect_to_region(
        region,
        aws_access_key_id=assume_role.credentials.access_key,
        aws_secret_access_key=assume_role.credentials.secret_key,
        security_token=assume_role.credentials.session_token)
    topic_info = []
    topics = sns.get_all_topics()
    topics = topics["ListTopicsResponse"]["ListTopicsResult"]["Topics"]
    for topic in topics:
        policy = sns.get_topic_attributes(topic["TopicArn"])
        policy = policy["GetTopicAttributesResponse"][
            "GetTopicAttributesResult"]["Attributes"]["Policy"]
        topic_info.append(
            config_line_policy(region + " sns:topicpolicy", topic["TopicArn"],
                               "", policy))

    return sorted(topic_info)
Ejemplo n.º 8
0
def checkLogs(buckets):
	
	#Set ignored id list, add your own account ID here
	ignoredId = []
	
	#Static email address for testing
	#emailAddr = "*****@*****.**" 

	#Set the name of our cloudTrails bucket
	ct_name = "cloudtrailadam"
	
	for bucket in buckets:			
		#Iterate through buckets and find the cloudtrail bucket
		if bucket.name == ct_name:
			#Iterate though all keys in the bucket such that key points to the last one
			#which is the last created log file
			for key in bucket:
				#Check if key is a file and not a folder by checking the end of the path
				if not key.name.endswith('/'):
					#Construct an empty StringIO object
					f = StringIO.StringIO()
					#Using the boto s3 method get_file, retrieve the file from the S3 key and place the data in the StringIO buffer
					key.get_file(f)
					#Set the position of the read/write pointer to the beginning of the file
					f.seek(0, 0)
					#Construct a new GzipFile object and pass it the file object contained in f
					gzfile = gzip.GzipFile(fileobj=f)
					#get the data from the file using pythons .read method
					data = gzfile.read()
					#Pass the data to the .loads method in the json library which returns an object 
					j = json.loads(data)
					#Set the parent key from the JSON to look for keys within the main key
					parent = j["Records"]	
					#Iterate though the json parent key again
					for item in parent:
						#If the accountId of any event does not match user specified one.
						if item['userIdentity']['accountId'] not in ignoredId: 
							print "\nAccess from unknown account: ", item['userIdentity']['accountId'],  " found!\n"
							#print the details of the event
							print "Event Details: ", item["sourceIPAddress"], item["userIdentity"]["type"], item["userIdentity"]["accountId"], item["eventName"], item["eventTime"]
							
							while(True):
								input = raw_input("\nDo you wish to ignore events from this account ID? (Y/N) ").lower()							
								if input in ('yes', 'y', 'ye'):
									#Add the event account ID to the list of ignored IDs
									ignoredId.append(item['userIdentity']['accountId'])
									break
								elif input in ('no', 'n', '0'):								
									input = raw_input("Do you wish to be notified of the first event of this ID via email? (Y/N) > ").lower()
									if input in ('yes', 'y', 'ye'):					
										#Set up email address
										emailAddr = raw_input("Please enter an email address to receive alarm notifications: ")
										#Create SNS connection
										sns = boto.sns.connect_to_region("eu-west-1", aws_access_key_id=key_id, aws_secret_access_key=secret_key)
										#Pull all of the topic ARNs on the account and store them in topics
										topics = sns.get_all_topics()
										#Get the first topic ARN and store it in topic
										topic = topics[u'ListTopicsResponse']['ListTopicsResult']['Topics'][0]['TopicArn']
										#Set up email message body to contain event information
										msg = "Event details -  Source IP: " + str(item["sourceIPAddress"]) + " :  Account ID: " + str(item["userIdentity"]["accountId"]) + " :  Event type: " + str(item["eventName"]) + " :  Event time: " +  str(item["eventTime"])
										#Set up email message subject
										subject = "Unauthorised account access"
										#Public this message to SNS
										sns.publish(topic, msg, subject)
										#Subscribe to the alarm using the specified email address and the email protocol
										sns.subscribe(topic, "email", emailAddr)
										#Add ID to ignored list to continue checking for other unauthorised accounts
										ignoredId.append(item['userIdentity']['accountId'])
										break
									elif input in ('no', 'n', '0'):
										break
									else:
										print "Invalid command"
								else:
									print "Invalid command"
					
	print "\n\nCheck complete\n"
Ejemplo n.º 9
0
import boto.sqs
import boto.sns
from boto.sqs.message import Message
from alchemyapi import AlchemyAPI
import ast


conn = boto.sqs.connect_to_region("us-west-2", aws_access_key_id='*',aws_secret_access_key='*')
text={}
sns = boto.sns.connect_to_region("us-west-2", aws_access_key_id='*',aws_secret_access_key='*')
topics = sns.get_all_topics()
mytopics = topics["ListTopicsResponse"]["ListTopicsResult"]["Topics"]
mytopic_arn = mytopics[0]["TopicArn"]
print mytopic_arn

alchemyapi = AlchemyAPI()
#p = 0
while True:
	try:
		my_queue = conn.get_queue('myqueue6')
		rs = my_queue.get_messages()
		#a = len(rs)
		#print a
		#while len(rs) != 0:
		m = rs[0]
		#m.get_body()
		text=ast.literal_eval(m.get_body())
		text1=text["text"]
		text2=text["coordinates"]
		print text1
		print text2
Ejemplo n.º 10
0
def checkLogs(buckets):

    #Set ignored id list, add your own account ID here
    ignoredId = []

    #Static email address for testing
    #emailAddr = "*****@*****.**"

    #Set the name of our cloudTrails bucket
    ct_name = "cloudtrailadam"

    for bucket in buckets:
        #Iterate through buckets and find the cloudtrail bucket
        if bucket.name == ct_name:
            #Iterate though all keys in the bucket such that key points to the last one
            #which is the last created log file
            for key in bucket:
                #Check if key is a file and not a folder by checking the end of the path
                if not key.name.endswith('/'):
                    #Construct an empty StringIO object
                    f = StringIO.StringIO()
                    #Using the boto s3 method get_file, retrieve the file from the S3 key and place the data in the StringIO buffer
                    key.get_file(f)
                    #Set the position of the read/write pointer to the beginning of the file
                    f.seek(0, 0)
                    #Construct a new GzipFile object and pass it the file object contained in f
                    gzfile = gzip.GzipFile(fileobj=f)
                    #get the data from the file using pythons .read method
                    data = gzfile.read()
                    #Pass the data to the .loads method in the json library which returns an object
                    j = json.loads(data)
                    #Set the parent key from the JSON to look for keys within the main key
                    parent = j["Records"]
                    #Iterate though the json parent key again
                    for item in parent:
                        #If the accountId of any event does not match user specified one.
                        if item['userIdentity']['accountId'] not in ignoredId:
                            print "\nAccess from unknown account: ", item[
                                'userIdentity']['accountId'], " found!\n"
                            #print the details of the event
                            print "Event Details: ", item[
                                "sourceIPAddress"], item["userIdentity"][
                                    "type"], item["userIdentity"][
                                        "accountId"], item["eventName"], item[
                                            "eventTime"]

                            while (True):
                                input = raw_input(
                                    "\nDo you wish to ignore events from this account ID? (Y/N) "
                                ).lower()
                                if input in ('yes', 'y', 'ye'):
                                    #Add the event account ID to the list of ignored IDs
                                    ignoredId.append(
                                        item['userIdentity']['accountId'])
                                    break
                                elif input in ('no', 'n', '0'):
                                    input = raw_input(
                                        "Do you wish to be notified of the first event of this ID via email? (Y/N) > "
                                    ).lower()
                                    if input in ('yes', 'y', 'ye'):
                                        #Set up email address
                                        emailAddr = raw_input(
                                            "Please enter an email address to receive alarm notifications: "
                                        )
                                        #Create SNS connection
                                        sns = boto.sns.connect_to_region(
                                            "eu-west-1",
                                            aws_access_key_id=key_id,
                                            aws_secret_access_key=secret_key)
                                        #Pull all of the topic ARNs on the account and store them in topics
                                        topics = sns.get_all_topics()
                                        #Get the first topic ARN and store it in topic
                                        topic = topics[u'ListTopicsResponse'][
                                            'ListTopicsResult']['Topics'][0][
                                                'TopicArn']
                                        #Set up email message body to contain event information
                                        msg = "Event details -  Source IP: " + str(
                                            item["sourceIPAddress"]
                                        ) + " :  Account ID: " + str(
                                            item["userIdentity"]["accountId"]
                                        ) + " :  Event type: " + str(
                                            item["eventName"]
                                        ) + " :  Event time: " + str(
                                            item["eventTime"])
                                        #Set up email message subject
                                        subject = "Unauthorised account access"
                                        #Public this message to SNS
                                        sns.publish(topic, msg, subject)
                                        #Subscribe to the alarm using the specified email address and the email protocol
                                        sns.subscribe(topic, "email",
                                                      emailAddr)
                                        #Add ID to ignored list to continue checking for other unauthorised accounts
                                        ignoredId.append(
                                            item['userIdentity']['accountId'])
                                        break
                                    elif input in ('no', 'n', '0'):
                                        break
                                    else:
                                        print "Invalid command"
                                else:
                                    print "Invalid command"

    print "\n\nCheck complete\n"
Ejemplo n.º 11
0
def setAlarm():
    #An SNS connection object is created by passing the region, key and secret key to the connection_to_region() method
    sns = boto.sns.connect_to_region('eu-west-1',
                                     aws_access_key_id=key_id,
                                     aws_secret_access_key=secret_key)
    #An cloudwatch connection object is created by passing the region, key and secret key to the connection_to_region() method
    cw = boto.ec2.cloudwatch.connect_to_region(
        "eu-west-1",
        aws_access_key_id=key_id,
        aws_secret_access_key=secret_key)

    print "\nEnabling Cloudwatch monitoring on running instances..\n"

    #Invoke the get_all_topics method to return a dictionary containing all topic arns on the account
    topics = sns.get_all_topics()

    #Get the first [0] topic arm from the dictionary
    topic = topics[u'ListTopicsResponse']['ListTopicsResult']['Topics'][0][
        'TopicArn']

    emailAddr = raw_input(
        "Please enter an email address to receive alarm notifications: ")

    #emailAddr = "*****@*****.**"

    print "\nSNS email address set to %s\n" % emailAddr
    #Iterate through the list of reservation objects returned by get_all_reservations()
    #This method returns a list of all EC2 instance objects
    for reservation in conn.get_all_reservations():
        #iterate through all instances in reservation
        for instance in reservation.instances:
            #Set boolean to alert use if no running instances found
            any_running = False

            #for any instances that have their state set to running
            if instance.state == u'running':
                #Call the monitor_instance method on the EC2 connection object with the specified instance id to enable monitoring
                conn.monitor_instance(instance.id)

                alarm_name = 'CPU Utilization < 40 for instance: %s' % instance.id
                #Set the dimensions for the alarm using the current instance id
                alarm_dimensions = {"InstanceId": instance.id}
                #Set up the alarm by passing in relevant arguments to the Metric alarm method
                #Notable arguments would be threshold being the % to check against and dimensions being the instances to activate the alarm on
                alarm = MetricAlarm(name=alarm_name,
                                    comparison='<',
                                    threshold=40,
                                    period=300,
                                    evaluation_periods=2,
                                    namespace='AWS/EC2',
                                    metric='CPUUtilization',
                                    statistic='Average',
                                    alarm_actions=[topic],
                                    dimensions=alarm_dimensions)
                #Create the alarm
                cw.create_alarm(alarm)
                print "Alarm set for instance: %s" % instance.id
                #Subscribe to the alarm using the specified email address and the email protocol
                sns.subscribe(topic, "email", emailAddr)
                any_running = True
            if not any_running:
                print "\nNo running instances found. No alarm set."
Ejemplo n.º 12
0
import boto.sqs
import boto.sns
from boto.sqs.message import Message
from alchemyapi import AlchemyAPI
import ast

conn = boto.sqs.connect_to_region("us-west-2",
                                  aws_access_key_id='*',
                                  aws_secret_access_key='*')
text = {}
sns = boto.sns.connect_to_region("us-west-2",
                                 aws_access_key_id='*',
                                 aws_secret_access_key='*')
topics = sns.get_all_topics()
mytopics = topics["ListTopicsResponse"]["ListTopicsResult"]["Topics"]
mytopic_arn = mytopics[0]["TopicArn"]
print mytopic_arn

alchemyapi = AlchemyAPI()
#p = 0
while True:
    try:
        my_queue = conn.get_queue('myqueue6')
        rs = my_queue.get_messages()
        #a = len(rs)
        #print a
        #while len(rs) != 0:
        m = rs[0]
        #m.get_body()
        text = ast.literal_eval(m.get_body())
        text1 = text["text"]
Ejemplo n.º 13
0
args = parser.parse_args()

# process common command line arguments
log = logging.getLogger('botocross')
bc.configure_logging(log, args.log_level)
credentials = bc.parse_credentials(args)
regions = bc.filter_regions(boto.sns.regions(), args.region)

# execute business logic
log.info("Describing SNS topics:")

for region in regions:
    try:
        sns = boto.connect_sns(region=region, **credentials)

        topics = []
        next_token = None
        while True:
            result = sns.get_all_topics(next_token)
            topics.extend(
                result['ListTopicsResponse']['ListTopicsResult']['Topics'])
            next_token = result['ListTopicsResponse']['ListTopicsResult'][
                'NextToken']
            if not next_token:
                break
        print region.name + ": " + str(len(topics)) + " topics:"
        for topic in topics:
            print topic['TopicArn']
    except boto.exception.BotoServerError, e:
        log.error(e.error_message)
Ejemplo n.º 14
0
def checkLogs(buckets):

    ignoredId = []

    ct_name = "cloudtrailadam"

    for bucket in buckets:
        if bucket.name == ct_name:
            for key in bucket:
                if not key.name.endswith('/'):
                    f = StringIO.StringIO()
                    key.get_file(f)
                    f.seek(0, 0)
                    gzfile = gzip.GzipFile(fileobj=f)
                    data = gzfile.read()
                    j = json.loads(data)
                    parent = j["Records"]
                    for item in parent:
                        if item['userIdentity']['accountId'] not in ignoredId:
                            print "\nAccess from unknown account: ", item[
                                'userIdentity']['accountId'], " found!\n"
                            print "Event Details: ", item[
                                "sourceIPAddress"], item["userIdentity"][
                                    "type"], item["userIdentity"][
                                        "accountId"], item["eventName"], item[
                                            "eventTime"]

                            while (True):
                                input = raw_input(
                                    "\nDo you wish to ignore events from this account ID? (Y/N) "
                                ).lower()
                                if input in ('yes', 'y', 'ye'):
                                    ignoredId.append(
                                        item['userIdentity']['accountId'])
                                    break
                                elif input in ('no', 'n', '0'):
                                    input = raw_input(
                                        "Do you wish to be notified of the first event of this ID via email? (Y/N) > "
                                    ).lower()
                                    if input in ('yes', 'y', 'ye'):
                                        emailAddr = raw_input(
                                            "Please enter an email address to receive alarm notifications: "
                                        )
                                        sns = boto.sns.connect_to_region(
                                            "eu-west-1",
                                            aws_access_key_id=key_id,
                                            aws_secret_access_key=secret_key)
                                        topics = sns.get_all_topics()
                                        topic = topics[u'ListTopicsResponse'][
                                            'ListTopicsResult']['Topics'][0][
                                                'TopicArn']
                                        msg = "Event details -  Source IP: " + str(
                                            item["sourceIPAddress"]
                                        ) + " :  Account ID: " + str(
                                            item["userIdentity"]["accountId"]
                                        ) + " :  Event type: " + str(
                                            item["eventName"]
                                        ) + " :  Event time: " + str(
                                            item["eventTime"])
                                        subject = "Unauthorised account access"
                                        sns.publish(topic, msg, subject)
                                        sns.subscribe(topic, "email",
                                                      emailAddr)
                                        ignoredId.append(
                                            item['userIdentity']['accountId'])
                                        break
                                    elif input in ('no', 'n', '0'):
                                        break
                                    else:
                                        print "Invalid command"
                                else:
                                    print "Invalid command"

    print "\n\nCheck complete\n"
Ejemplo n.º 15
0
def alarmProcessor():
    
	# Firstly we need to connect to the Simple Notification Service and CloudWatch service - this was a bit tricky and again the documentation was unclear.  I thought you would use boto.connect_sns(region=reg) 
	# which seems to successfully connect and is similar to how we connected to S3 and EC2 services.  However calling methods e.g. get_all_topics() yields the error "The requested version (2010-03-31) of 
	# service AmazonEC2 does not exist".  On further investigation I found that to connect use boto.sns.connect_to_region().  You have to supply the region as an argument - note that it expected a string 
	# not a region object - which again is inconsistent with EC2. To connect to the CloudWatch service as with SNS you have to use the connect_to_region() method
    sns = boto.sns.connect_to_region("eu-west-1")
    cw = boto.ec2.cloudwatch.connect_to_region("eu-west-1")
    
    if (not args.clear):
        print "\nCreating new topics (+ subscription) and alarms:\n"
        # Once connected we create a topic which is basically an access point composed of an identifier and recipients to send message to. create_topic() returns a unique ARN (Amazon Resource Name) which
        # will include the service name (SNS), region, AWS ID of the user and the topic name - this is a dict so we need to go three levels in to get the actual ARN number.  We will use the arn when
        # we create a subscription which is how we link a topic to an endpoint like an email address.

        topicName = 'TopicStephenCIT-1-UID'+str(random.randrange(1000000))
        response = sns.create_topic(topicName)
        topicARN = response['CreateTopicResponse']['CreateTopicResult']['TopicArn']
        
        print '\tTopic ARN created: ',topicARN
		
		#Subscribe links a topic with an endpoint - in this case an email address
        sns.subscribe(topicARN, 'email',  args.email)

        #We now have topic/subscription - the email address supplied will have to accept the AWS Notification Subscription Confirmation‏ email message to ensure they get alerts
        # We will now create a unique alarm per instance.  We can use the create_alarm method which expects a  boto.ec2.cloudwatch.alarm.MetricAlarm object.  This object defines 
		# all the properties of the alarm - name,metric,topic etc. We loop through all the instance and create an alarm for each instance.  Note we use the ARN that was created 
		# above which ties the alarm to notification logic
                                                   
        for index, inst in enumerate(instances):
            alarmName = "StephenMurrayCPU-" + str(index) + inst.id +'-UID' + str(random.randrange(1000000))
            alarm = boto.ec2.cloudwatch.MetricAlarm(name=alarmName, namespace='AWS/EC2',metric='CPUUtilization',
                                                    statistic='Average',comparison='<', threshold='40',period='60', evaluation_periods=2,
                                                    dimensions = {"InstanceId": inst.id},
                                                    alarm_actions= topicARN)
            cw.create_alarm(alarm)
            print "\tAlarm created", alarmName
    
    else:
        print "\nClearing topics, subscriptions (confirmed) and alarms:\n"
        
        #Get all topics
        returnAllTopicsObject = sns.get_all_topics()
        #to access the ARN field we need have to go 3 levels deep into returned object
        topics = returnAllTopicsObject['ListTopicsResponse']['ListTopicsResult']['Topics']

        #now we have a list containing dicts where the only value is the TopicArn which is what we need to supply the delete method
        # only do action if list is not empty - there has to be some topics to delete
        if topics:
            for t in (topics):
                topicARNDelete = t['TopicArn']
                #delete topics
                sns.delete_topic(topicARNDelete)
                print "\tTopic Deleted: ", topicARNDelete
        else:
            print "\tNo topics found"

        # Get all subscriptions
        # Very similar to topics - get subscriptions, extract relevant parameter from retuned dict object, loop through, get SubscriptionArn
        # and send for deletion - also do a check to ensure subscriptions exist

        returnAllSubObject = sns.get_all_subscriptions()
        #to access the Sub ARN field we need have to go 3 levels deep into returned object
        subscriptions = returnAllSubObject['ListSubscriptionsResponse']['ListSubscriptionsResult']['Subscriptions']

        if subscriptions:
            for s in (subscriptions):
                subARNDelete = s['SubscriptionArn']
                #delete subscription only if returned value is not equal to PendingConfirmation
                if (subARNDelete != 'PendingConfirmation'):
                    sns.unsubscribe(subARNDelete)
                    print "\tSunscription Deleted: ", subARNDelete
        else:
            print "\tNo subscriptions found"

        #Get all alarms
        #describe_alarms() returns a list of boto.ec2.cloudwatch.alarm.MetricAlarms object from which we can extract the alarm name (.name method) which we can
        # use to delete it - Note in this case we do not require the ARN to delete - on testing with IDLE it was noted that when a complete arn
        # arn:aws:cloudwatch:eu-west-1:135577527805:alarm:StephenMurrayCPU0i-690b332b was supplied the delete_alarms() method returned True even though it was
        # not deleted...this is not good as as when StephenMurrayCPU0i-690b332b was supplied it deleted the alarm and also returned True.

        alarms = cw.describe_alarms()
        if alarms:
            for a in (alarms):
                cw.delete_alarms(a.name)
                print "\tAlarms Deleted: ", a.name
        else:
            print "\tNo alarms found"
Ejemplo n.º 16
0
                                 parents=[bc.build_region_parser(), bc.build_common_parser()])
args = parser.parse_args()

# process common command line arguments
log = logging.getLogger('botocross')
bc.configure_logging(log, args.log_level)
credentials = bc.parse_credentials(args)
regions = bc.filter_regions(boto.sns.regions(), args.region)

# execute business logic
log.info("Describing SNS topics:")


for region in regions:
    try:
        sns = boto.connect_sns(region=region, **credentials)

        topics = []
        next_token = None
        while True:
            result = sns.get_all_topics(next_token)
            topics.extend(result['ListTopicsResponse']['ListTopicsResult']['Topics'])
            next_token = result['ListTopicsResponse']['ListTopicsResult']['NextToken']
            if not next_token:
                break
        print region.name + ": " + str(len(topics)) + " topics:"
        for topic in topics:
           print topic['TopicArn']
    except boto.exception.BotoServerError, e:
        log.error(e.error_message)