Expand description
Spam peers deployed to AWS EC2 with random messages.
§Setup
To run this example, you must first install Rust and Docker.
§Install commonware-deployer
cargo install commonware-deployer
§Create Deployer Artifacts
cargo run --bin setup -- --peers 3 --bootstrappers 1 --regions us-west-2,us-east-1,eu-west-1 --instance-type c7g.xlarge --storage-size 10 --storage-class gp3 --worker-threads 4 --message-size 1024 --message-backlog 16384 --mailbox-size 16384 --dashboard dashboard.json --output assets
We use 3 peers (instead of the 2 required to test connection performance) to demonstrate that peer discovery works.
§Build Flood Binary
§Build Cross-Platform Compiler
docker build -t flood-builder .
§Compile Binary for ARM64
docker run -it -v ${PWD}/../..:/monorepo flood-builder
Emitted binary flood
is placed in assets
.
§Deploy Flood Binary
cd assets
deployer ec2 create --config config.yaml
§Monitor Performance on Grafana
Visit http://<monitoring-ip>:3000/d/flood
This dashboard is only accessible from the IP used to deploy the infrastructure.
§(Optional) Update Flood Binary
§Re-Compile Binary for ARM64
docker run -it -v ${PWD}/../..:/monorepo flood-builder
§Restart Flood Binary on EC2 Instances
deployer ec2 update --config config.yaml
§Destroy Infrastructure
deployer ec2 destroy --config config.yaml
§Debugging
§Missing AWS Credentials
If commonware-deployer
can’t detect your AWS credentials, you’ll see a “Request has expired.” error:
2025-03-05T01:36:47.550105Z INFO deployer::ec2::create: created EC2 client region="eu-west-1"
2025-03-05T01:36:48.268330Z ERROR deployer: failed to create EC2 deployment error=AwsEc2(Unhandled(Unhandled { source: ErrorMetadata { code: Some("RequestExpired"), message: Some("Request has expired."), extras: Some({"aws_request_id": "006f6b92-4965-470d-8eac-7c9644744bdf"}) }, meta: ErrorMetadata { code: Some("RequestExpired"), message: Some("Request has expired."), extras: Some({"aws_request_id": "006f6b92-4965-470d-8eac-7c9644744bdf"}) } }))
§EC2 Throttling
EC2 instances may throttle network traffic if a workload exceeds the allocation for a particular instance type. To check if an instance is throttled, SSH into the instance and run:
ethtool -S ens5 | grep "allowance"
If throttled, you’ll see a non-zero value for some “allowance” item:
bw_in_allowance_exceeded: 0
bw_out_allowance_exceeded: 14368
pps_allowance_exceeded: 0
conntrack_allowance_exceeded: 0
linklocal_allowance_exceeded: 0
Structs§
- Config
- Configuration for flood.