diff --git a/charts/aws-ssm/aws-ssm-chaos-by-id/aws-ssm-chaos-by-id.chartserviceversion.yaml b/charts/aws-ssm/aws-ssm-chaos-by-id/aws-ssm-chaos-by-id.chartserviceversion.yaml new file mode 100644 index 0000000..3d4fd71 --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-id/aws-ssm-chaos-by-id.chartserviceversion.yaml @@ -0,0 +1,45 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2021-06-10T10:28:08Z + name: aws-ssm-chaos-by-id + version: 0.1.0 + annotations: + categories: Kubernetes + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: aws-ssm-chaos-by-id + categoryDescription: | + AWS SSM Chaos By ID contains chaos to disrupt the state of infra resources. The experiment can induce chaos on AWS resources using Amazon SSM Run Command This is carried out by using SSM Docs that defines the actions performed by Systems Manager on your managed instances (having SSM agent installed) which let us perform chaos experiments on resources. + - Causes chaos on AWS ec2 instances with given instance ID(s) using SSM docs for total chaos duration with the specified chaos interval. + - Tests deployment sanity (replica availability & uninterrupted service) and recovery workflows of the target application pod(if provided). + keywords: + - Kubernetes + - SSM + - AWS + - Document + - Run Command + platforms: + - AWS + maturity: alpha + chaosType: infra + maintainers: + - name: Udit Gaurav + email: udit@chaosnative.com + provider: + name: ChaosNative + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/aws-ssm/aws-ssm-chaos-by-id + - name: Documentation + url: https://docs.litmuschaos.io/docs/aws-ssm-chaos-by-id/ + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/aws-ssm/aws-ssm-chaos-by-id/experiment.yaml diff --git a/charts/aws-ssm/aws-ssm-chaos-by-id/engine.yaml b/charts/aws-ssm/aws-ssm-chaos-by-id/engine.yaml new file mode 100644 index 0000000..1e0df68 --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-id/engine.yaml @@ -0,0 +1,29 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: nginx-chaos + namespace: default +spec: + engineState: 'active' + chaosServiceAccount: aws-ssm-chaos-by-id-sa + experiments: + - name: aws-ssm-chaos-by-id + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '60' + + # set chaos duration (in sec) as desired + - name: CHAOS_INTERVAL + value: '60' + + # Instance ID of the target ec2 instance + # Multiple IDs can also be provided as comma separated values ex: id1,id2 + - name: EC2_INSTANCE_ID + value: '' + + # provide the region name of the target instances + - name: REGION + value: '' diff --git a/charts/aws-ssm/aws-ssm-chaos-by-id/experiment.yaml b/charts/aws-ssm/aws-ssm-chaos-by-id/experiment.yaml new file mode 100644 index 0000000..10add3b --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-id/experiment.yaml @@ -0,0 +1,124 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + Execute AWS SSM Chaos on given ec2 instance IDs +kind: ChaosExperiment +metadata: + name: aws-ssm-chaos-by-id + labels: + name: aws-ssm-chaos-by-id + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Cluster + permissions: + - apiGroups: + - "" + - "batch" + - "litmuschaos.io" + resources: + - "jobs" + - "pods" + - "events" + - "pods/log" + - "pods/exec" + - "secrets" + - "configmaps" + - "chaosengines" + - "chaosexperiments" + - "chaosresults" + verbs: + - "create" + - "list" + - "get" + - "patch" + - "update" + - "delete" + image: "litmuschaos/go-runner:ci" + imagePullPolicy: Always + args: + - -c + - ./experiments -name aws-ssm-chaos-by-id + command: + - /bin/bash + env: + - name: TOTAL_CHAOS_DURATION + value: '60' + + - name: CHAOS_INTERVAL + value: '60' + + + # Period to wait before and after injection of chaos in sec + - name: RAMP_TIME + value: '' + + # Instance ID of the target ec2 instance + # Multiple IDs can also be provided as comma separated values ex: id1,id2 + - name: EC2_INSTANCE_ID + value: '' + + - name: REGION + value: '' + + # it defines the sequence of chaos execution for multiple target instances + # supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + # Provide the path of aws credentials mounted from secret + - name: AWS_SHARED_CREDENTIALS_FILE + value: '/tmp/cloud_config.yml' + + # Provide the name of ssm doc + # if not using the default stress docs + - name: DOCUMENT_NAME + value: '' + + # Provide the type of ssm doc + # if not using the default stress docs + - name: DOCUMENT_TYPE + value: '' + + # Provide the format of ssm doc + # if not using the default stress docs + - name: DOCUMENT_FORMAT + value: '' + + # Provide the path of ssm doc + # if not using the default stress docs + - name: DOCUMENT_PATH + value: '' + + # if you want to install dependencies to run default ssm docs + - name: INSTALL_DEPENDENCIES + value: 'True' + + # provide the number of workers for memory stress + - name: NUMBER_OF_WORKERS + value: '1' + + # provide the percentage of available memory to stress + - name: MEMORY_PERCENTAGE + value: '80' + + # provide the CPU chores to be comsumed + # 0 will consume all the available cpu cores + - name: CPU_CORE + value: '0' + + # provide the LIB + # only litmus supported + - name: LIB + value: 'litmus' + + labels: + name: aws-ssm-chaos-by-id + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest + secrets: + - name: cloud-secret + mountPath: /tmp/ diff --git a/charts/aws-ssm/aws-ssm-chaos-by-id/rbac.yaml b/charts/aws-ssm/aws-ssm-chaos-by-id/rbac.yaml new file mode 100644 index 0000000..cea6238 --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-id/rbac.yaml @@ -0,0 +1,46 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: aws-ssm-chaos-by-id-sa + namespace: default + labels: + name: aws-ssm-chaos-by-id-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aws-ssm-chaos-by-id-sa + labels: + name: aws-ssm-chaos-by-id-sa + app.kubernetes.io/part-of: litmus +rules: +- apiGroups: [""] + resources: ["pods","events","secrets","configmaps"] + verbs: ["create","list","get","patch","update","delete","deletecollection"] +- apiGroups: [""] + resources: ["pods/exec","pods/log"] + verbs: ["create","list","get"] +- apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] +- apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: aws-ssm-chaos-by-id-sa + labels: + name: aws-ssm-chaos-by-id-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: aws-ssm-chaos-by-id-sa +subjects: +- kind: ServiceAccount + name: aws-ssm-chaos-by-id-sa + namespace: default diff --git a/charts/aws-ssm/aws-ssm-chaos-by-tag/aws-ssm-chaos-by-tag.chartserviceversion.yaml b/charts/aws-ssm/aws-ssm-chaos-by-tag/aws-ssm-chaos-by-tag.chartserviceversion.yaml new file mode 100644 index 0000000..1b8ef92 --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-tag/aws-ssm-chaos-by-tag.chartserviceversion.yaml @@ -0,0 +1,45 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2021-06-10T10:28:08Z + name: aws-ssm-chaos-by-tag + version: 0.1.0 + annotations: + categories: Kubernetes + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: aws-ssm-chaos-by-tag + categoryDescription: | + AWS SSM Chaos By ID contains chaos to disrupt the state of infra resources. The experiment can induce chaos on AWS resources using Amazon SSM Run Command This is carried out by using SSM Docs that defines the actions performed by Systems Manager on your managed instances (having SSM agent installed) which let us perform chaos experiments on resources. + - Causes chaos on AWS ec2 instances with given instance tag using SSM docs for total chaos duration with the specified chaos interval. + - Tests deployment sanity (replica availability & uninterrupted service) and recovery workflows of the target application pod(if provided). + keywords: + - Kubernetes + - SSM + - AWS + - Document + - Run Command + platforms: + - AWS + maturity: alpha + chaosType: infra + maintainers: + - name: Udit Gaurav + email: udit@chaosnative.com + provider: + name: ChaosNative + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/aws-ssm/aws-ssm-chaos-by-tag + - name: Documentation + url: https://docs.litmuschaos.io/docs/aws-ssm-chaos-by-tag/ + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/aws-ssm/aws-ssm-chaos-by-tag/experiment.yaml diff --git a/charts/aws-ssm/aws-ssm-chaos-by-tag/engine.yaml b/charts/aws-ssm/aws-ssm-chaos-by-tag/engine.yaml new file mode 100644 index 0000000..c10f7a7 --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-tag/engine.yaml @@ -0,0 +1,29 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: nginx-chaos + namespace: default +spec: + engineState: 'active' + chaosServiceAccount: aws-ssm-chaos-by-tag-sa + experiments: + - name: aws-ssm-chaos-by-tag + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '60' + + # set chaos duration (in sec) as desired + - name: CHAOS_INTERVAL + value: '60' + + # provide tag of the target ec2 instances + # ex: team:devops (key:value) + - name: EC2_INSTANCE_TAG + value: '' + + # provide the region name of the target instances + - name: REGION + value: '' diff --git a/charts/aws-ssm/aws-ssm-chaos-by-tag/experiment.yaml b/charts/aws-ssm/aws-ssm-chaos-by-tag/experiment.yaml new file mode 100644 index 0000000..42bd36e --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-tag/experiment.yaml @@ -0,0 +1,127 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + Execute AWS SSM Chaos on given ec2 instance Tag +kind: ChaosExperiment +metadata: + name: aws-ssm-chaos-by-tag + labels: + name: aws-ssm-chaos-by-tag + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Cluster + permissions: + - apiGroups: + - "" + - "batch" + - "litmuschaos.io" + resources: + - "jobs" + - "pods" + - "events" + - "pods/log" + - "pods/exec" + - "secrets" + - "configmaps" + - "chaosengines" + - "chaosexperiments" + - "chaosresults" + verbs: + - "create" + - "list" + - "get" + - "patch" + - "update" + - "delete" + image: "litmuschaos/go-runner:ci" + imagePullPolicy: Always + args: + - -c + - ./experiments -name aws-ssm-chaos-by-tag + command: + - /bin/bash + env: + - name: TOTAL_CHAOS_DURATION + value: '60' + + - name: CHAOS_INTERVAL + value: '60' + + # Period to wait before and after injection of chaos in sec + - name: RAMP_TIME + value: '' + + # provide tag of the target ec2 instances + # ex: team:devops (key:value) + - name: EC2_INSTANCE_TAG + value: '' + + - name: REGION + value: '' + + # it defines the sequence of chaos execution for multiple target instances + # supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + # Provide the path of aws credentials mounted from secret + - name: AWS_SHARED_CREDENTIALS_FILE + value: '/tmp/cloud_config.yml' + + # percentage of total instance to target + - name: INSTANCE_AFFECTED_PERC + value: '' + + # Provide the name of ssm doc + # if not using the default stress docs + - name: DOCUMENT_NAME + value: '' + + # Provide the type of ssm doc + # if not using the default stress docs + - name: DOCUMENT_TYPE + value: '' + + # Provide the format of ssm doc + # if not using the default stress docs + - name: DOCUMENT_FORMAT + value: '' + + # Provide the path of ssm doc + # if not using the default stress docs + - name: DOCUMENT_PATH + value: '' + + # if you want to install dependencies to run default ssm docs + - name: INSTALL_DEPENDENCIES + value: 'True' + + # provide the number of workers for memory stress + - name: NUMBER_OF_WORKERS + value: '1' + + # provide the percentage of available memory to stress + - name: MEMORY_PERCENTAGE + value: '80' + + # provide the CPU chores to comsumed + # 0 will consume all the available cpu cores + - name: CPU_CORE + value: '0' + + # provide the LIB + # only litmus supported + - name: LIB + value: 'litmus' + + labels: + name: aws-ssm-chaos-by-tag + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest + secrets: + - name: cloud-secret + mountPath: /tmp/ diff --git a/charts/aws-ssm/aws-ssm-chaos-by-tag/rbac.yaml b/charts/aws-ssm/aws-ssm-chaos-by-tag/rbac.yaml new file mode 100644 index 0000000..56b3ca5 --- /dev/null +++ b/charts/aws-ssm/aws-ssm-chaos-by-tag/rbac.yaml @@ -0,0 +1,46 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: aws-ssm-chaos-by-tag-sa + namespace: default + labels: + name: aws-ssm-chaos-by-tag-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: aws-ssm-chaos-by-tag-sa + labels: + name: aws-ssm-chaos-by-tag-sa + app.kubernetes.io/part-of: litmus +rules: +- apiGroups: [""] + resources: ["pods","events","secrets","configmaps"] + verbs: ["create","list","get","patch","update","delete","deletecollection"] +- apiGroups: [""] + resources: ["pods/exec","pods/log"] + verbs: ["create","list","get"] +- apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] +- apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: aws-ssm-chaos-by-tag-sa + labels: + name: aws-ssm-chaos-by-tag-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: aws-ssm-chaos-by-tag-sa +subjects: +- kind: ServiceAccount + name: aws-ssm-chaos-by-tag-sa + namespace: default diff --git a/charts/aws-ssm/aws-ssm.chartserviceversion.yaml b/charts/aws-ssm/aws-ssm.chartserviceversion.yaml new file mode 100644 index 0000000..2cf336b --- /dev/null +++ b/charts/aws-ssm/aws-ssm.chartserviceversion.yaml @@ -0,0 +1,36 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2021-06-11T10:28:08Z + name: aws ssm + version: 0.1.0 + annotations: + categories: Kubernetes + chartDescription: Injects aws ssm chaos +spec: + displayName: AWS SSM + categoryDescription: > + aws ssm contains chaos to disrupt state of aws resources by litmus aws ssm docs + experiments: + - aws-ssm-chaos-by-id + - aws-ssm-chaos-by-tag + keywords: + - AWS + - SSM + - EC2 + maintainers: + - name: ksatchit + email: karthik@chaosnative.com + provider: + name: ChaosNative + links: + - name: Kubernetes Website + url: https://kubernetes.io + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/aws-ssm + - name: Kubernetes Slack + url: https://slack.kubernetes.io/ + icon: + - url: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/aws-ssm/icons/aws-ssm.png + mediatype: image/png + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/aws-ssm/experiments.yaml diff --git a/charts/aws-ssm/aws-ssm.package.yaml b/charts/aws-ssm/aws-ssm.package.yaml new file mode 100644 index 0000000..cfae7ec --- /dev/null +++ b/charts/aws-ssm/aws-ssm.package.yaml @@ -0,0 +1,8 @@ +packageName: aws-ssm +experiments: + - name: aws-ssm-chaos-by-id + CSV: aws-ssm-chaos-by-id.chartserviceversion.yaml + desc: "aws-ssm-chaos-by-id" + - name: aws-ssm-chaos-by-tag + CSV: aws-ssm-chaos-by-tag.chartserviceversion.yaml + desc: "aws-ssm-chaos-by-tag" \ No newline at end of file diff --git a/charts/aws-ssm/experiments.yaml b/charts/aws-ssm/experiments.yaml new file mode 100644 index 0000000..148633f --- /dev/null +++ b/charts/aws-ssm/experiments.yaml @@ -0,0 +1,238 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + Execute AWS SSM Chaos on given ec2 instance IDs +kind: ChaosExperiment +metadata: + name: aws-ssm-chaos-by-id + labels: + name: aws-ssm-chaos-by-id + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Cluster + permissions: + - apiGroups: + - "" + - "batch" + - "litmuschaos.io" + resources: + - "jobs" + - "pods" + - "events" + - "pods/log" + - "pods/exec" + - "secrets" + - "chaosengines" + - "chaosexperiments" + - "chaosresults" + verbs: + - "create" + - "list" + - "get" + - "patch" + - "update" + - "delete" + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name aws-ssm-chaos-by-id + command: + - /bin/bash + env: + - name: TOTAL_CHAOS_DURATION + value: '60' + + - name: CHAOS_INTERVAL + value: '60' + + # Period to wait before and after injection of chaos in sec + - name: RAMP_TIME + value: '' + + # Instance ID of the target ec2 instance + # Multiple IDs can also be provided as comma separated values ex: id1,id2 + - name: EC2_INSTANCE_ID + value: '' + + - name: REGION + value: '' + + # it defines the sequence of chaos execution for multiple target instances + # supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + # Provide the name of ssm doc + # if not using the default stress docs + - name: DOCUMENT_NAME + value: '' + + # Provide the type of ssm doc + # if not using the default stress docs + - name: DOCUMENT_TYPE + value: '' + + # Provide the format of ssm doc + # if not using the default stress docs + - name: DOCUMENT_FORMAT + value: '' + + # Provide the path of ssm doc + # if not using the default stress docs + - name: DOCUMENT_PATH + value: '' + + # if you want to install dependencies to run default ssm docs + - name: INSTALL_DEPENDENCIES + value: 'True' + + # provide the number of workers for memory stress + - name: NUMBER_OF_WORKERS + value: '1' + + # provide the percentage of available memory to stress + - name: MEMORY_PERCENTAGE + value: '80' + + # provide the CPU chore to comsume + # giving 0 will consume all the available cpu cores + - name: CPU + value: '0' + + # provide the LIB + # only litmus supported + - name: LIB + value: 'litmus' + + labels: + name: aws-ssm-chaos-by-id + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest +--- +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + Execute AWS SSM Chaos on given ec2 instance Tag +kind: ChaosExperiment +metadata: + name: aws-ssm-chaos-by-tag + labels: + name: aws-ssm-chaos-by-tag + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Cluster + permissions: + - apiGroups: + - "" + - "batch" + - "litmuschaos.io" + resources: + - "jobs" + - "pods" + - "events" + - "pods/log" + - "pods/exec" + - "secrets" + - "chaosengines" + - "chaosexperiments" + - "chaosresults" + verbs: + - "create" + - "list" + - "get" + - "patch" + - "update" + - "delete" + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name aws-ssm-chaos-by-tag + command: + - /bin/bash + env: + - name: TOTAL_CHAOS_DURATION + value: '60' + + - name: CHAOS_INTERVAL + value: '60' + + # Period to wait before and after injection of chaos in sec + - name: RAMP_TIME + value: '' + + # provide tag of the target ec2 instances + # ex: team:devops (key:value) + - name: EC2_INSTANCE_TAG + value: '' + + - name: REGION + value: '' + + # it defines the sequence of chaos execution for multiple target instances + # supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + # percentage of total instance to target + - name: INSTANCE_AFFECTED_PERC + value: '' + + # Provide the name of ssm doc + # if not using the default stress docs + - name: DOCUMENT_NAME + value: '' + + # Provide the type of ssm doc + # if not using the default stress docs + - name: DOCUMENT_TYPE + value: '' + + # Provide the format of ssm doc + # if not using the default stress docs + - name: DOCUMENT_FORMAT + value: '' + + # Provide the path of ssm doc + # if not using the default stress docs + - name: DOCUMENT_PATH + value: '' + + # if you want to install dependencies to run default ssm docs + - name: INSTALL_DEPENDENCIES + value: 'True' + + # provide the number of workers for memory stress + - name: NUMBER_OF_WORKERS + value: '1' + + # provide the percentage of available memory to stress + - name: MEMORY_PERCENTAGE + value: '80' + + # provide the CPU chore to comsume + # giving 0 will consume all the available cpu cores + - name: CPU + value: '0' + + # provide the LIB + # only litmus supported + - name: LIB + value: 'litmus' + + labels: + name: aws-ssm-chaos-by-tag + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest + secrets: + - name: cloud-secret + mountPath: /tmp/ diff --git a/charts/aws-ssm/icons/aws-ssm-chaos-by-id.png b/charts/aws-ssm/icons/aws-ssm-chaos-by-id.png new file mode 100644 index 0000000..fd09e34 Binary files /dev/null and b/charts/aws-ssm/icons/aws-ssm-chaos-by-id.png differ diff --git a/charts/aws-ssm/icons/aws-ssm-chaos-by-tag.png b/charts/aws-ssm/icons/aws-ssm-chaos-by-tag.png new file mode 100644 index 0000000..fd09e34 Binary files /dev/null and b/charts/aws-ssm/icons/aws-ssm-chaos-by-tag.png differ diff --git a/charts/aws-ssm/icons/aws-ssm.png b/charts/aws-ssm/icons/aws-ssm.png new file mode 100644 index 0000000..fd09e34 Binary files /dev/null and b/charts/aws-ssm/icons/aws-ssm.png differ