Contents
- Summary
- Architecture diagram and high level overview of all the solutions
- AWS IAM permissions
- AWS EventBridge and Lambda
- EC2 instance ebs snapshot delete solution
- Coming up next
Summary
Welcome to PART-2 of a four part tutorial, on how to leverage AWS services like Lambda and EventBridge, to perform housekeeping on your AWS infrastructure on a schedule automatically. In my last post, I talked about how to create EBS snapshots of an instance using python, AWS lambda and AWS eventbridge. In this post we will talk about building the second part, where old EBS snapshots will be cleaned up automatically. 'Old' will be defined as a number of days, in this case 7.
- [PART-1] Create EBS volume snapshots of all our AWS EC2 instances in all regions, and tag them. You can find the link to the post here.
- [PART-2] Cleanup EBS volume snapshots from all our regions, whose age is greater than X days.
Architecture diagram and high level overview of all the solutions
Architecture diagram
EC2 instance daily ebs volume snapshots
I am going to list out all instances in all of our regions, and its associated volumes, and create EBS snapshots from them. Also I am going to add custom tags to these snapshots.
EC2 instance daily ebs snapshot cleanup after X days
I am going to list all the EBS snapshots that we own in our regions, and then delete those older than X days.
AWS IAM permissions
Create an IAM role with the following permissions and trust policy.
Permissions
Attach a permission policy template to your role which will allow for:
- AWS cloudwatch log stream creation and writing.
- Describe EC2 instances, volumes, snapshots and AMI's.
- EC2 snapshot creation and deletion.
- EC2 volume deletion.
- EC2 AMI deregistration.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"logs:CreateLogStream",
"logs:CreateLogGroup",
"logs:PutLogEvents"
],
"Resource": "arn:aws:logs:*:*:*"
},
{
"Effect": "Allow",
"Action": [
"ec2:CreateSnapshot",
"ec2:CreateTags",
"ec2:DeleteSnapshot",
"ec2:Describe*",
"ec2:ModifySnapshotAttribute",
"ec2:ResetSnapshotAttribute",
"ec2:DeleteVolume",
"ec2:DeregisterImage"
],
"Resource": "*"
}
]
}
Trust relationship
Allow the lambda service access to your IAM role.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "lambda.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
AWS EventBridge and Lambda
I am going to use AWS Lambda to run our python code to do run our infrastructure maintenance.
I am going to use AWS EventBridge to run our code via lambda on a schedule. I am going to define our schedule using a cron expression, to trigger daily at midnight, local to our timezone.
You can create an EventBridge rule by going to AWS EventBridge service ➡️ rules ➡️ create rule. The cron expression we will use will be cron(30 18 * * ? *). I am based in India, and this translate to midnight IST timezone, which is 18:30:00 GMT.
I am going to use AWS Cloudwatch logs to log the data from our lambda runs.
EC2 instance ebs snapshot delete solution
Workflow and code
- The workflow that I will use is: > 🕛 Midnight ➡️ AWS EventBridge rule triggers ➡️ Runs Lambda code ➡️ Checks EBS snapshots, and if they are created more than 7 days back, deletes them ➡️ Logs to cloudwatch logs
-
Install boto3
python3 -m pip install boto3
-
Lambda code
- Initializaing a boto3 client
ec2_client = boto3.client('ec2')
- Fetching all regions
def get_regions(ec2_client): return [region['RegionName'] for region in ec2_client.describe_regions()['Regions']]
- Initializing a boto3 ec2 client per region
ec2_client = boto3.client('ec2',region_name=region)
- List all snapshots in the region for the account id using describe_snapshots(OwnerIds=[account_id]).
def get_snapshots_from_a_region(ec2_client,account_id): return (ec2_client.describe_snapshots(OwnerIds=[account_id])['Snapshots'])
- Compare the age of the snapshots to current date and time, and if the difference is greater than 7 days, delete the snapshot. We will use the delete_snapshot() method of the client to perform this activity.
def get_age_of_snapshot(snap): return ((datetime.now() - snap['StartTime'].replace(tzinfo=None)).days) def delete_snapshot_from_a_region(ec2_client,snap): ec2_client.delete_snapshot(SnapshotId=snap['SnapshotId'])
Putting it all together - Take a look at my GITHUB page for the complete code.
Cloudwatch logs
Coming up next
Part 3 of this tutorial where I will talk about cleaning up unattached ebs volumes after X days.
Top comments (0)