From 5871cce087a0f657dee0c495f179f8d32d37f91b Mon Sep 17 00:00:00 2001 From: Shubham Chaudhary Date: Fri, 21 Oct 2022 14:31:34 +0530 Subject: [PATCH 1/3] chore(spring-boot): adding spring boot charts Signed-off-by: Shubham Chaudhary --- .idea/workspace.xml | 74 +++++++++++++ .../icons/spring-boot-app-kill.png | Bin 0 -> 2047 bytes .../icons/spring-boot-cpu-stress.png | Bin 0 -> 2047 bytes .../icons/spring-boot-exceptions.png | Bin 0 -> 2047 bytes .../spring-boot/icons/spring-boot-latency.png | Bin 0 -> 2047 bytes .../icons/spring-boot-memory-stress.png | Bin 0 -> 2047 bytes charts/spring-boot/icons/spring-boot.png | Bin 0 -> 2047 bytes .../spring-boot-app-kill/engine.yaml | 30 ++++++ .../spring-boot-app-kill/experiment.yaml | 84 +++++++++++++++ .../spring-boot-app-kill/rbac.yaml | 61 +++++++++++ ...ing-boot-app-kill.chartserviceversion.yaml | 49 +++++++++ .../spring-boot-cpu-stress/engine.yaml | 34 ++++++ .../spring-boot-cpu-stress/experiment.yaml | 92 ++++++++++++++++ .../spring-boot-cpu-stress/rbac.yaml | 61 +++++++++++ ...g-boot-cpu-stress.chartserviceversion.yaml | 49 +++++++++ .../spring-boot-exceptions/engine.yaml | 34 ++++++ .../spring-boot-exceptions/experiment.yaml | 88 +++++++++++++++ .../spring-boot-exceptions/rbac.yaml | 61 +++++++++++ ...g-boot-exceptions.chartserviceversion.yaml | 49 +++++++++ .../spring-boot-latency/engine.yaml | 34 ++++++ .../spring-boot-latency/experiment.yaml | 88 +++++++++++++++ .../spring-boot/spring-boot-latency/rbac.yaml | 61 +++++++++++ ...ring-boot-latency.chartserviceversion.yaml | 49 +++++++++ .../spring-boot-memory-stress/engine.yaml | 34 ++++++ .../spring-boot-memory-stress/experiment.yaml | 100 ++++++++++++++++++ .../spring-boot-memory-stress/rbac.yaml | 61 +++++++++++ ...oot-memory-stress.chartserviceversion.yaml | 49 +++++++++ .../spring-boot.chartserviceversion.yaml | 39 +++++++ charts/spring-boot/spring-boot.package.yaml | 17 +++ 29 files changed, 1298 insertions(+) create mode 100644 .idea/workspace.xml create mode 100644 charts/spring-boot/icons/spring-boot-app-kill.png create mode 100644 charts/spring-boot/icons/spring-boot-cpu-stress.png create mode 100644 charts/spring-boot/icons/spring-boot-exceptions.png create mode 100644 charts/spring-boot/icons/spring-boot-latency.png create mode 100644 charts/spring-boot/icons/spring-boot-memory-stress.png create mode 100644 charts/spring-boot/icons/spring-boot.png create mode 100644 charts/spring-boot/spring-boot-app-kill/engine.yaml create mode 100644 charts/spring-boot/spring-boot-app-kill/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-app-kill/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/engine.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/engine.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-latency/engine.yaml create mode 100644 charts/spring-boot/spring-boot-latency/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-latency/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/engine.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot.package.yaml diff --git a/.idea/workspace.xml b/.idea/workspace.xml new file mode 100644 index 000000000..d8cf12c00 --- /dev/null +++ b/.idea/workspace.xml @@ -0,0 +1,74 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + true + + \ No newline at end of file diff --git a/charts/spring-boot/icons/spring-boot-app-kill.png b/charts/spring-boot/icons/spring-boot-app-kill.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-cpu-stress.png b/charts/spring-boot/icons/spring-boot-cpu-stress.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-exceptions.png b/charts/spring-boot/icons/spring-boot-exceptions.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-latency.png b/charts/spring-boot/icons/spring-boot-latency.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-memory-stress.png b/charts/spring-boot/icons/spring-boot-memory-stress.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot.png b/charts/spring-boot/icons/spring-boot.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/spring-boot-app-kill/engine.yaml b/charts/spring-boot/spring-boot-app-kill/engine.yaml new file mode 100644 index 000000000..9fd90d657 --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/engine.yaml @@ -0,0 +1,30 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-app-kill-sa + experiments: + - name: spring-boot-app-kill + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # Cron expression like */1 * * * * ? can be set to enable chaos monkey AppKiller assault on a schedule + - name: CM_KILL_APPLICATION_CRON + value: '*/1 * * * * ?' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-app-kill/experiment.yaml b/charts/spring-boot/spring-boot-app-kill/experiment.yaml new file mode 100644 index 000000000..1cc0b2bb7 --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/experiment.yaml @@ -0,0 +1,84 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject app-kill +kind: ChaosExperiment +metadata: + name: spring-boot-app-kill + labels: + name: spring-boot-app-kill + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-app-kill + command: + - /bin/bash + env: + + # Cron expression like */1 * * * * ? can be set to enable chaos monkey AppKiller assault on a schedule + - name: CM_KILL_APPLICATION_CRON + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-app-kill + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-app-kill/rbac.yaml b/charts/spring-boot/spring-boot-app-kill/rbac.yaml new file mode 100644 index 000000000..991ef22c3 --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-app-kill-sa + namespace: default + labels: + name: spring-boot-app-kill-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-app-kill-sa + namespace: default + labels: + name: spring-boot-app-kill-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-app-kill-sa + namespace: default + labels: + name: spring-boot-app-kill-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-app-kill-sa +subjects: +- kind: ServiceAccount + name: spring-boot-app-kill-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml b/charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml new file mode 100644 index 000000000..184c5302c --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-app-kill + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-app-kill + categoryDescription: | + This experiment allows injecting Chaos Monkey app-kill assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject app-kill. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-app-kill + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-app-kill + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-app-kill/experiment.yaml diff --git a/charts/spring-boot/spring-boot-cpu-stress/engine.yaml b/charts/spring-boot/spring-boot-cpu-stress/engine.yaml new file mode 100644 index 000000000..594917987 --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/engine.yaml @@ -0,0 +1,34 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-cpu-stress-sa + experiments: + - name: spring-boot-cpu-stress + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # Cron expression like */1 * * * * ? can be set to enable cpu assault on a schedule + - name: CM_CPU_CRON + value: '*/1 * * * * ?' + + # Final fraction of used cpu by assault. 0.95 equals 95 %. + - name: CM_CPU_LOAD_TARGET_FRACTION + value: '0.8' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml b/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml new file mode 100644 index 000000000..f6a46fb03 --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml @@ -0,0 +1,92 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject cpu-stress +kind: ChaosExperiment +metadata: + name: spring-boot-cpu-stress + labels: + name: spring-boot-cpu-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-cpu-stress + command: + - /bin/bash + env: + + # Cron expression like */1 * * * * ? can be set to enable cpu assault on a schedule + - name: CM_CPU_CRON + value: '' + + # Duration to assault cpu when requested load is reached in ms. + - name: CM_CPU_MS_HOLD_LOAD + value: '15000' + + # Final fraction of used cpu by assault. 0.95 equals 95 %. + - name: CM_CPU_LOAD_TARGET_FRACTION + value: '0.95' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-cpu-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-cpu-stress/rbac.yaml b/charts/spring-boot/spring-boot-cpu-stress/rbac.yaml new file mode 100644 index 000000000..812ec5b0c --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-cpu-stress-sa + namespace: default + labels: + name: spring-boot-cpu-stress-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-cpu-stress-sa + namespace: default + labels: + name: spring-boot-cpu-stress-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-cpu-stress-sa + namespace: default + labels: + name: spring-boot-cpu-stress-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-cpu-stress-sa +subjects: +- kind: ServiceAccount + name: spring-boot-cpu-stress-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml b/charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml new file mode 100644 index 000000000..a040b370e --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-cpu-stress + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-cpu-stress + categoryDescription: | + This experiment allows injecting Chaos Monkey cpu stress assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject CPU stress. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-cpu-stress + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-cpu-stress + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-cpu-stress/experiment.yaml diff --git a/charts/spring-boot/spring-boot-exceptions/engine.yaml b/charts/spring-boot/spring-boot-exceptions/engine.yaml new file mode 100644 index 000000000..d75a7cefd --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/engine.yaml @@ -0,0 +1,34 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-exceptions-sa + experiments: + - name: spring-boot-exceptions + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # Type of raised exception + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-exceptions/experiment.yaml b/charts/spring-boot/spring-boot-exceptions/experiment.yaml new file mode 100644 index 000000000..9e51d7667 --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/experiment.yaml @@ -0,0 +1,88 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject network latency +kind: ChaosExperiment +metadata: + name: spring-boot-exceptions + labels: + name: spring-boot-exceptions + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-exceptions + command: + - /bin/bash + env: + + # Type of raised exception + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-exceptions + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-exceptions/rbac.yaml b/charts/spring-boot/spring-boot-exceptions/rbac.yaml new file mode 100644 index 000000000..6ef38bad2 --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-exceptions-sa + namespace: default + labels: + name: spring-boot-exceptions-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-exceptions-sa + namespace: default + labels: + name: spring-boot-exceptions-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-exceptions-sa + namespace: default + labels: + name: spring-boot-exceptions-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-exceptions-sa +subjects: +- kind: ServiceAccount + name: spring-boot-exceptions-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml b/charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml new file mode 100644 index 000000000..ac9e8ee24 --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-exceptions + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-exceptions + categoryDescription: | + This experiment allows injecting Chaos Monkey exceptions assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject exception. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-exceptions + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-exceptions + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-exceptions/experiment.yaml diff --git a/charts/spring-boot/spring-boot-latency/engine.yaml b/charts/spring-boot/spring-boot-latency/engine.yaml new file mode 100644 index 000000000..9647a20b1 --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/engine.yaml @@ -0,0 +1,34 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-latency-sa + experiments: + - name: spring-boot-latency + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # Minimum latency (ms) + - name: CM_LATENCY_RANGE_START + value: '2000' + + # Maximum latency (ms) + - name: CM_LATENCY_RANGE_END + value: '5000' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-latency/experiment.yaml b/charts/spring-boot/spring-boot-latency/experiment.yaml new file mode 100644 index 000000000..d3c031c0c --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/experiment.yaml @@ -0,0 +1,88 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject network latency +kind: ChaosExperiment +metadata: + name: spring-boot-latency + labels: + name: spring-boot-latency + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-latency + command: + - /bin/bash + env: + + # Minimum latency (ms) + - name: CM_LATENCY_RANGE_START + value: '2000' + + # Maximum latency (ms) + - name: CM_LATENCY_RANGE_END + value: '5000' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-latency + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-latency/rbac.yaml b/charts/spring-boot/spring-boot-latency/rbac.yaml new file mode 100644 index 000000000..91b9639db --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-latency-sa + namespace: default + labels: + name: spring-boot-latency-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-latency-sa + namespace: default + labels: + name: spring-boot-latency-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-latency-sa + namespace: default + labels: + name: spring-boot-latency-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-latency-sa +subjects: +- kind: ServiceAccount + name: spring-boot-latency-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml b/charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml new file mode 100644 index 000000000..f8553bded --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-latency + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-latency + categoryDescription: | + This experiment allows injecting Chaos Monkey network latency assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject latency. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-latency + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-latency + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-latency/experiment.yaml diff --git a/charts/spring-boot/spring-boot-memory-stress/engine.yaml b/charts/spring-boot/spring-boot-memory-stress/engine.yaml new file mode 100644 index 000000000..cbabf2e68 --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/engine.yaml @@ -0,0 +1,34 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-memory-stress-sa + experiments: + - name: spring-boot-memory-stress + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # Cron expression like */1 * * * * ? can be set to enable chaos monkey memory assault on a schedule + - name: CM_MEMORY_CRON + value: '*/1 * * * * ?' + + # Final fraction of used memory by assault. 0.95 equals 95 %. + - name: CM_MEMORY_FILL_TARGET_FRACTION + value: '0.70' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-memory-stress/experiment.yaml b/charts/spring-boot/spring-boot-memory-stress/experiment.yaml new file mode 100644 index 000000000..6861437a0 --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/experiment.yaml @@ -0,0 +1,100 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject memory-stress +kind: ChaosExperiment +metadata: + name: spring-boot-memory-stress + labels: + name: spring-boot-memory-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-memory-stress + command: + - /bin/bash + env: + + # Cron expression like */1 * * * * ? can be set to enable chaos monkey memory assault on a schedule + - name: CM_MEMORY_CRON + value: '*/1 * * * * ?' + + # Duration to assault memory when requested load is reached in ms. + - name: CM_MEMORY_MS_HOLD_FILLED_MEM + value: '30000' + + # Time in ms between increases of memory usage. + - name: CM_MEMORY_MS_NEXT_INCREASE + value: '5000' + + # Fraction of one individual memory increase iteration. 1.0 equals 100 %. + - name: CM_MEMORY_FILL_INC_FRACTION + value: '1.0' + + # Final fraction of used memory by assault. 0.95 equals 95 %. + - name: CM_MEMORY_FILL_TARGET_FRACTION + value: '0.70' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-memory-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-memory-stress/rbac.yaml b/charts/spring-boot/spring-boot-memory-stress/rbac.yaml new file mode 100644 index 000000000..4b467751f --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-memory-stress-sa + namespace: default + labels: + name: spring-boot-memory-stress-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-memory-stress-sa + namespace: default + labels: + name: spring-boot-memory-stress-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-memory-stress-sa + namespace: default + labels: + name: spring-boot-memory-stress-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-memory-stress-sa +subjects: +- kind: ServiceAccount + name: spring-boot-memory-stress-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml b/charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml new file mode 100644 index 000000000..568687cf2 --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-memory-stress + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-memory-stress + categoryDescription: | + This experiment allows injecting Chaos Monkey memory-stress assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject memory-stress. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-memory-stress + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-memory-stress + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-memory-stress/experiment.yaml diff --git a/charts/spring-boot/spring-boot.chartserviceversion.yaml b/charts/spring-boot/spring-boot.chartserviceversion.yaml new file mode 100644 index 000000000..0c3d58dc9 --- /dev/null +++ b/charts/spring-boot/spring-boot.chartserviceversion.yaml @@ -0,0 +1,39 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot + version: 0.1.0 + annotations: + categories: Spring Boot + chartDescription: Injects spring boot chaos +spec: + displayName: Spring Boot Chaos + categoryDescription: > + It contains chaos to disrupt state of spring-boot application. + experiments: + - spring-boot-app-kill + - spring-boot-cpu-stress + - spring-boot-memory-stress + - spring-boot-latency + - spring-boot-exceptions + keywords: + - Kubernetes + - Spring Boot + - K8S + - Pod + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + links: + - name: Documentation + url: https://spring.io/projects/spring-boot + icon: + - url: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot/icons/spring-boot.png + mediatype: image/png + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot/experiments.yaml diff --git a/charts/spring-boot/spring-boot.package.yaml b/charts/spring-boot/spring-boot.package.yaml new file mode 100644 index 000000000..0748b0bcd --- /dev/null +++ b/charts/spring-boot/spring-boot.package.yaml @@ -0,0 +1,17 @@ +packageName: spring-boot +experiments: + - name: spring-boot-app-kill + CSV: spring-boot-app-kill.chartserviceversion.yaml + desc: "spring-boot-app-kill" + - name: spring-boot-cpu-stress + CSV: spring-boot-cpu-stress.chartserviceversion.yaml + desc: "spring-boot-cpu-stress" + - name: spring-boot-memory-stress + CSV: spring-boot-memory-stress.chartserviceversion.yaml + desc: "spring-boot-memory-stress" + - name: spring-boot-latency + CSV: spring-boot-latency.chartserviceversion.yaml + desc: "spring-boot-latency" + - name: spring-boot-exceptions + CSV: spring-boot-exceptions.chartserviceversion.yaml + desc: "spring-boot-exceptions" From e7a2e750f4f48308c5d049dd67b41df8a8df0af2 Mon Sep 17 00:00:00 2001 From: Shubham Chaudhary Date: Thu, 17 Nov 2022 21:32:15 +0530 Subject: [PATCH 2/3] adding charts Signed-off-by: Shubham Chaudhary --- .idea/workspace.xml | 74 ------------------- .../spring-boot-app-kill/engine.yaml | 10 +-- .../spring-boot-app-kill/experiment.yaml | 15 ++-- .../spring-boot-cpu-stress/engine.yaml | 13 ++-- .../spring-boot-cpu-stress/experiment.yaml | 22 ++++-- .../spring-boot-exceptions/engine.yaml | 4 + .../spring-boot-exceptions/experiment.yaml | 13 ++++ .../spring-boot-latency/engine.yaml | 10 +-- .../spring-boot-latency/experiment.yaml | 19 +++-- .../spring-boot-memory-stress/engine.yaml | 13 ++-- .../spring-boot-memory-stress/experiment.yaml | 30 ++++---- 11 files changed, 91 insertions(+), 132 deletions(-) delete mode 100644 .idea/workspace.xml diff --git a/.idea/workspace.xml b/.idea/workspace.xml deleted file mode 100644 index d8cf12c00..000000000 --- a/.idea/workspace.xml +++ /dev/null @@ -1,74 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - true - - \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-app-kill/engine.yaml b/charts/spring-boot/spring-boot-app-kill/engine.yaml index 9fd90d657..81def2733 100644 --- a/charts/spring-boot/spring-boot-app-kill/engine.yaml +++ b/charts/spring-boot/spring-boot-app-kill/engine.yaml @@ -16,13 +16,9 @@ spec: spec: components: env: - # set chaos duration (in sec) as desired - - name: TOTAL_CHAOS_DURATION - value: '30' - - # Cron expression like */1 * * * * ? can be set to enable chaos monkey AppKiller assault on a schedule - - name: CM_KILL_APPLICATION_CRON - value: '*/1 * * * * ?' + # port of the spring boot application + - name: CM_PORT + value: '' ## percentage of total pods to target - name: PODS_AFFECTED_PERC diff --git a/charts/spring-boot/spring-boot-app-kill/experiment.yaml b/charts/spring-boot/spring-boot-app-kill/experiment.yaml index 1cc0b2bb7..31355f06b 100644 --- a/charts/spring-boot/spring-boot-app-kill/experiment.yaml +++ b/charts/spring-boot/spring-boot-app-kill/experiment.yaml @@ -46,9 +46,17 @@ spec: command: - /bin/bash env: + # port of the spring boot application + - name: CM_PORT + value: '' + + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' - # Cron expression like */1 * * * * ? can be set to enable chaos monkey AppKiller assault on a schedule - - name: CM_KILL_APPLICATION_CRON + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES value: '' # provide name of watcher @@ -56,9 +64,6 @@ spec: - name: CM_WATCHERS value: 'restController' - - name: TOTAL_CHAOS_DURATION - value: '30' - ## percentage of total pods to target - name: PODS_AFFECTED_PERC value: '' diff --git a/charts/spring-boot/spring-boot-cpu-stress/engine.yaml b/charts/spring-boot/spring-boot-cpu-stress/engine.yaml index 594917987..e79586d05 100644 --- a/charts/spring-boot/spring-boot-cpu-stress/engine.yaml +++ b/charts/spring-boot/spring-boot-cpu-stress/engine.yaml @@ -20,13 +20,14 @@ spec: - name: TOTAL_CHAOS_DURATION value: '30' - # Cron expression like */1 * * * * ? can be set to enable cpu assault on a schedule - - name: CM_CPU_CRON - value: '*/1 * * * * ?' + # it contains fraction of used cpu. 0.95 equals 95%. + # it supports value in range [0.1,1.0] + - name: CPU_LOAD_FRACTION + value: '0.9' - # Final fraction of used cpu by assault. 0.95 equals 95 %. - - name: CM_CPU_LOAD_TARGET_FRACTION - value: '0.8' + # port of the spring boot application + - name: CM_PORT + value: '' ## percentage of total pods to target - name: PODS_AFFECTED_PERC diff --git a/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml b/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml index f6a46fb03..6820ce24c 100644 --- a/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml +++ b/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml @@ -47,17 +47,23 @@ spec: - /bin/bash env: - # Cron expression like */1 * * * * ? can be set to enable cpu assault on a schedule - - name: CM_CPU_CRON + # it contains fraction of cpu to be stressed(0.95 equals 95%) + # it supports value in range [0.1,1.0] + - name: CPU_LOAD_FRACTION + value: '0.9' + + # port of the spring boot application + - name: CM_PORT value: '' - # Duration to assault cpu when requested load is reached in ms. - - name: CM_CPU_MS_HOLD_LOAD - value: '15000' + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' - # Final fraction of used cpu by assault. 0.95 equals 95 %. - - name: CM_CPU_LOAD_TARGET_FRACTION - value: '0.95' + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' # provide name of watcher # it supports controller, restController, service, repository, component, webClient diff --git a/charts/spring-boot/spring-boot-exceptions/engine.yaml b/charts/spring-boot/spring-boot-exceptions/engine.yaml index d75a7cefd..fb496bc09 100644 --- a/charts/spring-boot/spring-boot-exceptions/engine.yaml +++ b/charts/spring-boot/spring-boot-exceptions/engine.yaml @@ -28,6 +28,10 @@ spec: - name: CM_EXCEPTIONS_ARGUMENTS value: 'java.lang.String:custom illegal argument exception' + # port of the spring boot application + - name: CM_PORT + value: '' + ## percentage of total pods to target - name: PODS_AFFECTED_PERC value: '' diff --git a/charts/spring-boot/spring-boot-exceptions/experiment.yaml b/charts/spring-boot/spring-boot-exceptions/experiment.yaml index 9e51d7667..e3703dda3 100644 --- a/charts/spring-boot/spring-boot-exceptions/experiment.yaml +++ b/charts/spring-boot/spring-boot-exceptions/experiment.yaml @@ -55,6 +55,19 @@ spec: - name: CM_EXCEPTIONS_ARGUMENTS value: 'java.lang.String:custom illegal argument exception' + # port of the spring boot application + - name: CM_PORT + value: '' + + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + # provide name of watcher # it supports controller, restController, service, repository, component, webClient - name: CM_WATCHERS diff --git a/charts/spring-boot/spring-boot-latency/engine.yaml b/charts/spring-boot/spring-boot-latency/engine.yaml index 9647a20b1..d34469c82 100644 --- a/charts/spring-boot/spring-boot-latency/engine.yaml +++ b/charts/spring-boot/spring-boot-latency/engine.yaml @@ -20,13 +20,13 @@ spec: - name: TOTAL_CHAOS_DURATION value: '30' - # Minimum latency (ms) - - name: CM_LATENCY_RANGE_START + # provide the latency (ms) + - name: LATENCY value: '2000' - # Maximum latency (ms) - - name: CM_LATENCY_RANGE_END - value: '5000' + # port of the spring boot application + - name: CM_PORT + value: '' ## percentage of total pods to target - name: PODS_AFFECTED_PERC diff --git a/charts/spring-boot/spring-boot-latency/experiment.yaml b/charts/spring-boot/spring-boot-latency/experiment.yaml index d3c031c0c..5c930f965 100644 --- a/charts/spring-boot/spring-boot-latency/experiment.yaml +++ b/charts/spring-boot/spring-boot-latency/experiment.yaml @@ -47,13 +47,22 @@ spec: - /bin/bash env: - # Minimum latency (ms) - - name: CM_LATENCY_RANGE_START + # provide the latency (ms) + - name: LATENCY value: '2000' - # Maximum latency (ms) - - name: CM_LATENCY_RANGE_END - value: '5000' + # port of the spring boot application + - name: CM_PORT + value: '' + + # it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' # provide name of watcher # it supports controller, restController, service, repository, component, webClient diff --git a/charts/spring-boot/spring-boot-memory-stress/engine.yaml b/charts/spring-boot/spring-boot-memory-stress/engine.yaml index cbabf2e68..16da3a5d7 100644 --- a/charts/spring-boot/spring-boot-memory-stress/engine.yaml +++ b/charts/spring-boot/spring-boot-memory-stress/engine.yaml @@ -20,14 +20,15 @@ spec: - name: TOTAL_CHAOS_DURATION value: '30' - # Cron expression like */1 * * * * ? can be set to enable chaos monkey memory assault on a schedule - - name: CM_MEMORY_CRON - value: '*/1 * * * * ?' - - # Final fraction of used memory by assault. 0.95 equals 95 %. - - name: CM_MEMORY_FILL_TARGET_FRACTION + # it contains fraction of used cpu. 0.70 equals 70%. + # it supports value in range [0.01,0.95] + - name: MEMORY_FILL_FRACTION value: '0.70' + # port of the spring boot application + - name: CM_PORT + value: '' + ## percentage of total pods to target - name: PODS_AFFECTED_PERC value: '' diff --git a/charts/spring-boot/spring-boot-memory-stress/experiment.yaml b/charts/spring-boot/spring-boot-memory-stress/experiment.yaml index 6861437a0..9c4b7be08 100644 --- a/charts/spring-boot/spring-boot-memory-stress/experiment.yaml +++ b/charts/spring-boot/spring-boot-memory-stress/experiment.yaml @@ -47,25 +47,23 @@ spec: - /bin/bash env: - # Cron expression like */1 * * * * ? can be set to enable chaos monkey memory assault on a schedule - - name: CM_MEMORY_CRON - value: '*/1 * * * * ?' - - # Duration to assault memory when requested load is reached in ms. - - name: CM_MEMORY_MS_HOLD_FILLED_MEM - value: '30000' + # it contains fraction of memory to be stressed(0.70 equals 70%) + # it supports value in range [0.01,0.95] + - name: MEMORY_FILL_FRACTION + value: '0.70' - # Time in ms between increases of memory usage. - - name: CM_MEMORY_MS_NEXT_INCREASE - value: '5000' + # port of the spring boot application + - name: CM_PORT + value: '' - # Fraction of one individual memory increase iteration. 1.0 equals 100 %. - - name: CM_MEMORY_FILL_INC_FRACTION - value: '1.0' + # it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' - # Final fraction of used memory by assault. 0.95 equals 95 %. - - name: CM_MEMORY_FILL_TARGET_FRACTION - value: '0.70' + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' # provide name of watcher # it supports controller, restController, service, repository, component, webClient From 10aaa8a2a642b4dc10248efbe96a1c5c980cbaae Mon Sep 17 00:00:00 2001 From: Shubham Chaudhary Date: Fri, 18 Nov 2022 15:20:48 +0530 Subject: [PATCH 3/3] chore(spring-boot): adding all spring-boot faults chart Signed-off-by: Shubham Chaudhary --- .../spring-boot/icons/spring-boot-faults.png | Bin 0 -> 2047 bytes .../spring-boot-faults/engine.yaml | 77 ++++++++++ .../spring-boot-faults/experiment.yaml | 140 ++++++++++++++++++ .../spring-boot/spring-boot-faults/rbac.yaml | 61 ++++++++ ...g-boot-cpu-stress.chartserviceversion.yaml | 49 ++++++ .../spring-boot.chartserviceversion.yaml | 1 + charts/spring-boot/spring-boot.package.yaml | 3 + 7 files changed, 331 insertions(+) create mode 100644 charts/spring-boot/icons/spring-boot-faults.png create mode 100644 charts/spring-boot/spring-boot-faults/engine.yaml create mode 100644 charts/spring-boot/spring-boot-faults/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-faults/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml diff --git a/charts/spring-boot/icons/spring-boot-faults.png b/charts/spring-boot/icons/spring-boot-faults.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/spring-boot-faults/engine.yaml b/charts/spring-boot/spring-boot-faults/engine.yaml new file mode 100644 index 000000000..ce886a0e3 --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/engine.yaml @@ -0,0 +1,77 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-faults-sa + experiments: + - name: spring-boot-faults + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # port of the spring boot application + - name: CM_PORT + value: '' + + # it enables spring app-kill fault + - name: CM_KILL_APPLICATION_ACTIVE + value: '' + + # it enables spring-boot latency fault + - name: CM_LATENCY_ACTIVE + value: '' + + # provide the latency (ms) + # it is applicable when latency is active + - name: LATENCY + value: '2000' + + # it enables spring-boot memory stress fault + - name: CM_MEMORY_ACTIVE + value: '' + + # it contains fraction of memory to be stressed(0.70 equals 70%) + # it supports value in range [0.01,0.95] + # it is applicable when memory is active + - name: MEMORY_FILL_FRACTION + value: '0.70' + + # it enables spring-boot cpu stress fault + - name: CM_CPU_ACTIVE + value: '' + + # it contains fraction of cpu to be stressed(0.95 equals 95%) + # it supports value in range [0.1,1.0] + # it is applicable when cpu is active + - name: CPU_LOAD_FRACTION + value: '0.9' + + # it enables spring-boot exceptions fault + - name: CM_EXCEPTIONS_ACTIVE + value: '' + + # Type of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-faults/experiment.yaml b/charts/spring-boot/spring-boot-faults/experiment.yaml new file mode 100644 index 000000000..33d555f13 --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/experiment.yaml @@ -0,0 +1,140 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject cpu-stress +kind: ChaosExperiment +metadata: + name: spring-boot-faults + labels: + name: spring-boot-faults + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-faults + command: + - /bin/bash + env: + + # it enables spring app-kill fault + - name: CM_KILL_APPLICATION_ACTIVE + value: '' + + # it enables spring-boot latency fault + - name: CM_LATENCY_ACTIVE + value: '' + + # provide the latency (ms) + # it is applicable when latency is active + - name: LATENCY + value: '2000' + + # it enables spring-boot memory stress fault + - name: CM_MEMORY_ACTIVE + value: '' + + # it contains fraction of memory to be stressed(0.70 equals 70%) + # it supports value in range [0.01,0.95] + # it is applicable when memory is active + - name: MEMORY_FILL_FRACTION + value: '0.70' + + # it enables spring-boot cpu stress fault + - name: CM_CPU_ACTIVE + value: '' + + # it contains fraction of cpu to be stressed(0.95 equals 95%) + # it supports value in range [0.1,1.0] + # it is applicable when cpu is active + - name: CPU_LOAD_FRACTION + value: '0.9' + + # it enables spring-boot exceptions fault + - name: CM_EXCEPTIONS_ACTIVE + value: '' + + # Type of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + # port of the spring boot application + - name: CM_PORT + value: '' + + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-faults + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-faults/rbac.yaml b/charts/spring-boot/spring-boot-faults/rbac.yaml new file mode 100644 index 000000000..3a124c956 --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-faults-sa + namespace: default + labels: + name: spring-boot-faults-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-faults-sa + namespace: default + labels: + name: spring-boot-faults-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-faults-sa + namespace: default + labels: + name: spring-boot-faults-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-faults-sa +subjects: +- kind: ServiceAccount + name: spring-boot-faults-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml b/charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml new file mode 100644 index 000000000..78e505533 --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-faults + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-faults + categoryDescription: | + This experiment allows injecting Chaos Monkey assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject Spring Boot faults. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-faults + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-faults + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-faults/experiment.yaml diff --git a/charts/spring-boot/spring-boot.chartserviceversion.yaml b/charts/spring-boot/spring-boot.chartserviceversion.yaml index 0c3d58dc9..5f2409e04 100644 --- a/charts/spring-boot/spring-boot.chartserviceversion.yaml +++ b/charts/spring-boot/spring-boot.chartserviceversion.yaml @@ -17,6 +17,7 @@ spec: - spring-boot-memory-stress - spring-boot-latency - spring-boot-exceptions + - spring-boot-faults keywords: - Kubernetes - Spring Boot diff --git a/charts/spring-boot/spring-boot.package.yaml b/charts/spring-boot/spring-boot.package.yaml index 0748b0bcd..0347743cb 100644 --- a/charts/spring-boot/spring-boot.package.yaml +++ b/charts/spring-boot/spring-boot.package.yaml @@ -15,3 +15,6 @@ experiments: - name: spring-boot-exceptions CSV: spring-boot-exceptions.chartserviceversion.yaml desc: "spring-boot-exceptions" + - name: spring-boot-faults + CSV: spring-boot-faults.chartserviceversion.yaml + desc: "spring-boot-faults" \ No newline at end of file