From f41ae893027c8a4d2494af915f38ce313795f5f7 Mon Sep 17 00:00:00 2001 From: Shubham Chaudhary Date: Mon, 21 Nov 2022 23:40:21 +0530 Subject: [PATCH] chore(spring-boot): adding spring boot charts (#575) * chore(spring-boot): adding spring boot charts Signed-off-by: Shubham Chaudhary --- .../icons/spring-boot-app-kill.png | Bin 0 -> 2047 bytes .../icons/spring-boot-cpu-stress.png | Bin 0 -> 2047 bytes .../icons/spring-boot-exceptions.png | Bin 0 -> 2047 bytes .../spring-boot/icons/spring-boot-faults.png | Bin 0 -> 2047 bytes .../spring-boot/icons/spring-boot-latency.png | Bin 0 -> 2047 bytes .../icons/spring-boot-memory-stress.png | Bin 0 -> 2047 bytes charts/spring-boot/icons/spring-boot.png | Bin 0 -> 2047 bytes .../spring-boot-app-kill/engine.yaml | 26 ++++ .../spring-boot-app-kill/experiment.yaml | 89 +++++++++++ .../spring-boot-app-kill/rbac.yaml | 61 ++++++++ ...ing-boot-app-kill.chartserviceversion.yaml | 49 ++++++ .../spring-boot-cpu-stress/engine.yaml | 35 +++++ .../spring-boot-cpu-stress/experiment.yaml | 98 ++++++++++++ .../spring-boot-cpu-stress/rbac.yaml | 61 ++++++++ ...g-boot-cpu-stress.chartserviceversion.yaml | 49 ++++++ .../spring-boot-exceptions/engine.yaml | 38 +++++ .../spring-boot-exceptions/experiment.yaml | 101 +++++++++++++ .../spring-boot-exceptions/rbac.yaml | 61 ++++++++ ...g-boot-exceptions.chartserviceversion.yaml | 49 ++++++ .../spring-boot-faults/engine.yaml | 77 ++++++++++ .../spring-boot-faults/experiment.yaml | 140 ++++++++++++++++++ .../spring-boot/spring-boot-faults/rbac.yaml | 61 ++++++++ ...g-boot-cpu-stress.chartserviceversion.yaml | 49 ++++++ .../spring-boot-latency/engine.yaml | 34 +++++ .../spring-boot-latency/experiment.yaml | 97 ++++++++++++ .../spring-boot/spring-boot-latency/rbac.yaml | 61 ++++++++ ...ring-boot-latency.chartserviceversion.yaml | 49 ++++++ .../spring-boot-memory-stress/engine.yaml | 35 +++++ .../spring-boot-memory-stress/experiment.yaml | 98 ++++++++++++ .../spring-boot-memory-stress/rbac.yaml | 61 ++++++++ ...oot-memory-stress.chartserviceversion.yaml | 49 ++++++ .../spring-boot.chartserviceversion.yaml | 40 +++++ charts/spring-boot/spring-boot.package.yaml | 20 +++ 33 files changed, 1588 insertions(+) create mode 100644 charts/spring-boot/icons/spring-boot-app-kill.png create mode 100644 charts/spring-boot/icons/spring-boot-cpu-stress.png create mode 100644 charts/spring-boot/icons/spring-boot-exceptions.png create mode 100644 charts/spring-boot/icons/spring-boot-faults.png create mode 100644 charts/spring-boot/icons/spring-boot-latency.png create mode 100644 charts/spring-boot/icons/spring-boot-memory-stress.png create mode 100644 charts/spring-boot/icons/spring-boot.png create mode 100644 charts/spring-boot/spring-boot-app-kill/engine.yaml create mode 100644 charts/spring-boot/spring-boot-app-kill/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-app-kill/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/engine.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/engine.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-faults/engine.yaml create mode 100644 charts/spring-boot/spring-boot-faults/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-faults/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-latency/engine.yaml create mode 100644 charts/spring-boot/spring-boot-latency/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-latency/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/engine.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/experiment.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/rbac.yaml create mode 100644 charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot.chartserviceversion.yaml create mode 100644 charts/spring-boot/spring-boot.package.yaml diff --git a/charts/spring-boot/icons/spring-boot-app-kill.png b/charts/spring-boot/icons/spring-boot-app-kill.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-cpu-stress.png b/charts/spring-boot/icons/spring-boot-cpu-stress.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-exceptions.png b/charts/spring-boot/icons/spring-boot-exceptions.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-faults.png b/charts/spring-boot/icons/spring-boot-faults.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-latency.png b/charts/spring-boot/icons/spring-boot-latency.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot-memory-stress.png b/charts/spring-boot/icons/spring-boot-memory-stress.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/icons/spring-boot.png b/charts/spring-boot/icons/spring-boot.png new file mode 100644 index 0000000000000000000000000000000000000000..fa8728f1a7fc2774700515a50cdf0f39f8959365 GIT binary patch literal 2047 zcmVv6S3^7!xh{P>Z?bmH&ZfxKPJ;=tDE z%$v!9-0Re#%!!A;WsAXVtkIXI&yan(SLgBJx7Vgxs~L5-OqIrYlfbv|000MCNkltS2%Dzw!<=bnnoA|MS9!Ud#r2+c^`j7uLfDj9 z<)y8A`Z1^A^R7e%0szhcAVhs4>a_hQ*48T=N$HpY1c}JGZ<{sn5<=HVM{+9iyTwy? z`2#5Iu)aW8(gl`iy@c(_s>w}BZiCtj*+F5aVrRcnr$EoL4%B^S(6cK)NE;{Tr5&le z#q+%65UpDs)hIJi+-DC=;E1{11^z-S0a$Ccl~PRic{}_`+?UWzJQ277lI_v@CHtM$ zQ9_S0deYO99rx0TGnTsvR=v1<2Xlhkdd+Pd^BXj}Js+B5b8WER;`P2aA``Gtx*Ri> zUTVY*-py=?0p}v@>bvZsx5$X%@L&+y@j}REC0tUnM1<7;iA`^muLH& zU%zXWrE^#vY!;J7-nOkUS506WJl1qS_R zzmesHw?+)G7vBz}oK-EigyffM&0!L2yqwJ*<(4G6JXVOAt#iJ(&7%Dfk>XOAt!X7U z{RUmXNb4V@xrF9(epurTFkB?M84;Hi#j-cjXxO44mc*f%c&Fuf1|7mO4a>2*|c#vJ8<8_Zrn^!i+5=>>nHZ##)vq1J!pF%-x45$0<^kXv+okUTmByY((MOS z_=%OeL79@XeR%Kf7}zU8$QbbTRwm5HGY2s4sSwz4_0oFr{a*rovPaHda@u?rMsPQn z)2U>+rq}1nao-c;MgiT86!80(m83Vy~rk);nrBKE*3> z;`XrEkK_^2b4flE`2g$HlgawzeF3ZegHmxCwfry9Mc%vRwkw&wfkefDvPU&~h~9bP z{q!l0sor_xmgZqU+fXs>P#JzxwbbT20=g3cVg6O0S7E>CxDI4~Im|7(k-A(g2f!n!8be zP#hfgC~>>N_ErMl_2^`iAQtI~NWz=pFjv#L(SH#&OESL(VJu6}q-AmOeiE*#;d_&d zNlkTmu^6!e_F;9dF_Vh^Ex=Z@@Tu~joJrrX0?LYW`@Al%$s}ZMWj0Tz_9?d9(VYRM zGK z(?O*xpKRA_ya)U$A5)Xq(j*;@^(gr#bIR>Z(hte2(7x^?wX-Wh#9_ts)mnpZX(@%4 zC;XhBHHl+~m*wZ`?at2r?H9v39$L_>#Wwp9_>W(godNUjx(n%V*No!pk&0XQU!OPW zzpAs}xIX%?&YSedQtb`I(W!63474n>(TR;SQ%1cCTVKLa2&(3w*kJK%M^D`DnJ_2y zQ&vQ~U$h$F^ICwRcKVQlsPFc+V|27>ErxH?4FUhPSS8V%*{k{z0Z+R+i;ARalA_Gj dV$~P7`Uea#Uq;u%XJh~X002ovPDHLkV1mt58$tj8 literal 0 HcmV?d00001 diff --git a/charts/spring-boot/spring-boot-app-kill/engine.yaml b/charts/spring-boot/spring-boot-app-kill/engine.yaml new file mode 100644 index 0000000..81def27 --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/engine.yaml @@ -0,0 +1,26 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-app-kill-sa + experiments: + - name: spring-boot-app-kill + spec: + components: + env: + # port of the spring boot application + - name: CM_PORT + value: '' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-app-kill/experiment.yaml b/charts/spring-boot/spring-boot-app-kill/experiment.yaml new file mode 100644 index 0000000..31355f0 --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/experiment.yaml @@ -0,0 +1,89 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject app-kill +kind: ChaosExperiment +metadata: + name: spring-boot-app-kill + labels: + name: spring-boot-app-kill + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-app-kill + command: + - /bin/bash + env: + # port of the spring boot application + - name: CM_PORT + value: '' + + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-app-kill + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-app-kill/rbac.yaml b/charts/spring-boot/spring-boot-app-kill/rbac.yaml new file mode 100644 index 0000000..991ef22 --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-app-kill-sa + namespace: default + labels: + name: spring-boot-app-kill-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-app-kill-sa + namespace: default + labels: + name: spring-boot-app-kill-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-app-kill-sa + namespace: default + labels: + name: spring-boot-app-kill-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-app-kill-sa +subjects: +- kind: ServiceAccount + name: spring-boot-app-kill-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml b/charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml new file mode 100644 index 0000000..184c530 --- /dev/null +++ b/charts/spring-boot/spring-boot-app-kill/spring-boot-app-kill.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-app-kill + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-app-kill + categoryDescription: | + This experiment allows injecting Chaos Monkey app-kill assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject app-kill. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-app-kill + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-app-kill + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-app-kill/experiment.yaml diff --git a/charts/spring-boot/spring-boot-cpu-stress/engine.yaml b/charts/spring-boot/spring-boot-cpu-stress/engine.yaml new file mode 100644 index 0000000..e79586d --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/engine.yaml @@ -0,0 +1,35 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-cpu-stress-sa + experiments: + - name: spring-boot-cpu-stress + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # it contains fraction of used cpu. 0.95 equals 95%. + # it supports value in range [0.1,1.0] + - name: CPU_LOAD_FRACTION + value: '0.9' + + # port of the spring boot application + - name: CM_PORT + value: '' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml b/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml new file mode 100644 index 0000000..6820ce2 --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/experiment.yaml @@ -0,0 +1,98 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject cpu-stress +kind: ChaosExperiment +metadata: + name: spring-boot-cpu-stress + labels: + name: spring-boot-cpu-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-cpu-stress + command: + - /bin/bash + env: + + # it contains fraction of cpu to be stressed(0.95 equals 95%) + # it supports value in range [0.1,1.0] + - name: CPU_LOAD_FRACTION + value: '0.9' + + # port of the spring boot application + - name: CM_PORT + value: '' + + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-cpu-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-cpu-stress/rbac.yaml b/charts/spring-boot/spring-boot-cpu-stress/rbac.yaml new file mode 100644 index 0000000..812ec5b --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-cpu-stress-sa + namespace: default + labels: + name: spring-boot-cpu-stress-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-cpu-stress-sa + namespace: default + labels: + name: spring-boot-cpu-stress-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-cpu-stress-sa + namespace: default + labels: + name: spring-boot-cpu-stress-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-cpu-stress-sa +subjects: +- kind: ServiceAccount + name: spring-boot-cpu-stress-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml b/charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml new file mode 100644 index 0000000..a040b37 --- /dev/null +++ b/charts/spring-boot/spring-boot-cpu-stress/spring-boot-cpu-stress.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-cpu-stress + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-cpu-stress + categoryDescription: | + This experiment allows injecting Chaos Monkey cpu stress assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject CPU stress. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-cpu-stress + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-cpu-stress + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-cpu-stress/experiment.yaml diff --git a/charts/spring-boot/spring-boot-exceptions/engine.yaml b/charts/spring-boot/spring-boot-exceptions/engine.yaml new file mode 100644 index 0000000..fb496bc --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/engine.yaml @@ -0,0 +1,38 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-exceptions-sa + experiments: + - name: spring-boot-exceptions + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # Type of raised exception + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + # port of the spring boot application + - name: CM_PORT + value: '' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-exceptions/experiment.yaml b/charts/spring-boot/spring-boot-exceptions/experiment.yaml new file mode 100644 index 0000000..e3703dd --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/experiment.yaml @@ -0,0 +1,101 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject network latency +kind: ChaosExperiment +metadata: + name: spring-boot-exceptions + labels: + name: spring-boot-exceptions + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-exceptions + command: + - /bin/bash + env: + + # Type of raised exception + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + # port of the spring boot application + - name: CM_PORT + value: '' + + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-exceptions + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-exceptions/rbac.yaml b/charts/spring-boot/spring-boot-exceptions/rbac.yaml new file mode 100644 index 0000000..6ef38ba --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-exceptions-sa + namespace: default + labels: + name: spring-boot-exceptions-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-exceptions-sa + namespace: default + labels: + name: spring-boot-exceptions-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-exceptions-sa + namespace: default + labels: + name: spring-boot-exceptions-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-exceptions-sa +subjects: +- kind: ServiceAccount + name: spring-boot-exceptions-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml b/charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml new file mode 100644 index 0000000..ac9e8ee --- /dev/null +++ b/charts/spring-boot/spring-boot-exceptions/spring-boot-exceptions.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-exceptions + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-exceptions + categoryDescription: | + This experiment allows injecting Chaos Monkey exceptions assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject exception. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-exceptions + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-exceptions + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-exceptions/experiment.yaml diff --git a/charts/spring-boot/spring-boot-faults/engine.yaml b/charts/spring-boot/spring-boot-faults/engine.yaml new file mode 100644 index 0000000..ce886a0 --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/engine.yaml @@ -0,0 +1,77 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-faults-sa + experiments: + - name: spring-boot-faults + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # port of the spring boot application + - name: CM_PORT + value: '' + + # it enables spring app-kill fault + - name: CM_KILL_APPLICATION_ACTIVE + value: '' + + # it enables spring-boot latency fault + - name: CM_LATENCY_ACTIVE + value: '' + + # provide the latency (ms) + # it is applicable when latency is active + - name: LATENCY + value: '2000' + + # it enables spring-boot memory stress fault + - name: CM_MEMORY_ACTIVE + value: '' + + # it contains fraction of memory to be stressed(0.70 equals 70%) + # it supports value in range [0.01,0.95] + # it is applicable when memory is active + - name: MEMORY_FILL_FRACTION + value: '0.70' + + # it enables spring-boot cpu stress fault + - name: CM_CPU_ACTIVE + value: '' + + # it contains fraction of cpu to be stressed(0.95 equals 95%) + # it supports value in range [0.1,1.0] + # it is applicable when cpu is active + - name: CPU_LOAD_FRACTION + value: '0.9' + + # it enables spring-boot exceptions fault + - name: CM_EXCEPTIONS_ACTIVE + value: '' + + # Type of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-faults/experiment.yaml b/charts/spring-boot/spring-boot-faults/experiment.yaml new file mode 100644 index 0000000..33d555f --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/experiment.yaml @@ -0,0 +1,140 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject cpu-stress +kind: ChaosExperiment +metadata: + name: spring-boot-faults + labels: + name: spring-boot-faults + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-faults + command: + - /bin/bash + env: + + # it enables spring app-kill fault + - name: CM_KILL_APPLICATION_ACTIVE + value: '' + + # it enables spring-boot latency fault + - name: CM_LATENCY_ACTIVE + value: '' + + # provide the latency (ms) + # it is applicable when latency is active + - name: LATENCY + value: '2000' + + # it enables spring-boot memory stress fault + - name: CM_MEMORY_ACTIVE + value: '' + + # it contains fraction of memory to be stressed(0.70 equals 70%) + # it supports value in range [0.01,0.95] + # it is applicable when memory is active + - name: MEMORY_FILL_FRACTION + value: '0.70' + + # it enables spring-boot cpu stress fault + - name: CM_CPU_ACTIVE + value: '' + + # it contains fraction of cpu to be stressed(0.95 equals 95%) + # it supports value in range [0.1,1.0] + # it is applicable when cpu is active + - name: CPU_LOAD_FRACTION + value: '0.9' + + # it enables spring-boot exceptions fault + - name: CM_EXCEPTIONS_ACTIVE + value: '' + + # Type of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_TYPE + value: 'java.lang.IllegalArgumentException' + + # Argument of raised exception + # it is applicable when exceptions is active + - name: CM_EXCEPTIONS_ARGUMENTS + value: 'java.lang.String:custom illegal argument exception' + + # port of the spring boot application + - name: CM_PORT + value: '' + + #it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-faults + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-faults/rbac.yaml b/charts/spring-boot/spring-boot-faults/rbac.yaml new file mode 100644 index 0000000..3a124c9 --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-faults-sa + namespace: default + labels: + name: spring-boot-faults-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-faults-sa + namespace: default + labels: + name: spring-boot-faults-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-faults-sa + namespace: default + labels: + name: spring-boot-faults-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-faults-sa +subjects: +- kind: ServiceAccount + name: spring-boot-faults-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml b/charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml new file mode 100644 index 0000000..78e5055 --- /dev/null +++ b/charts/spring-boot/spring-boot-faults/spring-boot-cpu-stress.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-faults + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-faults + categoryDescription: | + This experiment allows injecting Chaos Monkey assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject Spring Boot faults. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-faults + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-faults + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-faults/experiment.yaml diff --git a/charts/spring-boot/spring-boot-latency/engine.yaml b/charts/spring-boot/spring-boot-latency/engine.yaml new file mode 100644 index 0000000..d34469c --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/engine.yaml @@ -0,0 +1,34 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-latency-sa + experiments: + - name: spring-boot-latency + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # provide the latency (ms) + - name: LATENCY + value: '2000' + + # port of the spring boot application + - name: CM_PORT + value: '' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-latency/experiment.yaml b/charts/spring-boot/spring-boot-latency/experiment.yaml new file mode 100644 index 0000000..5c930f9 --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/experiment.yaml @@ -0,0 +1,97 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject network latency +kind: ChaosExperiment +metadata: + name: spring-boot-latency + labels: + name: spring-boot-latency + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-latency + command: + - /bin/bash + env: + + # provide the latency (ms) + - name: LATENCY + value: '2000' + + # port of the spring boot application + - name: CM_PORT + value: '' + + # it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-latency + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-latency/rbac.yaml b/charts/spring-boot/spring-boot-latency/rbac.yaml new file mode 100644 index 0000000..91b9639 --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-latency-sa + namespace: default + labels: + name: spring-boot-latency-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-latency-sa + namespace: default + labels: + name: spring-boot-latency-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-latency-sa + namespace: default + labels: + name: spring-boot-latency-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-latency-sa +subjects: +- kind: ServiceAccount + name: spring-boot-latency-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml b/charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml new file mode 100644 index 0000000..f8553bd --- /dev/null +++ b/charts/spring-boot/spring-boot-latency/spring-boot-latency.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-latency + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-latency + categoryDescription: | + This experiment allows injecting Chaos Monkey network latency assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject latency. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-latency + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-latency + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-latency/experiment.yaml diff --git a/charts/spring-boot/spring-boot-memory-stress/engine.yaml b/charts/spring-boot/spring-boot-memory-stress/engine.yaml new file mode 100644 index 0000000..16da3a5 --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/engine.yaml @@ -0,0 +1,35 @@ +apiVersion: litmuschaos.io/v1alpha1 +kind: ChaosEngine +metadata: + name: spring-boot-chaos + namespace: default +spec: + appinfo: + appns: 'default' + applabel: 'app=spring-boot' + appkind: 'deployment' + # It can be active/stop + engineState: 'active' + chaosServiceAccount: spring-boot-memory-stress-sa + experiments: + - name: spring-boot-memory-stress + spec: + components: + env: + # set chaos duration (in sec) as desired + - name: TOTAL_CHAOS_DURATION + value: '30' + + # it contains fraction of used cpu. 0.70 equals 70%. + # it supports value in range [0.01,0.95] + - name: MEMORY_FILL_FRACTION + value: '0.70' + + # port of the spring boot application + - name: CM_PORT + value: '' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + \ No newline at end of file diff --git a/charts/spring-boot/spring-boot-memory-stress/experiment.yaml b/charts/spring-boot/spring-boot-memory-stress/experiment.yaml new file mode 100644 index 0000000..9c4b7be --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/experiment.yaml @@ -0,0 +1,98 @@ +apiVersion: litmuschaos.io/v1alpha1 +description: + message: | + It can target random pods with a Spring Boot application and allows configuring the assaults to inject memory-stress +kind: ChaosExperiment +metadata: + name: spring-boot-memory-stress + labels: + name: spring-boot-memory-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: chaosexperiment + app.kubernetes.io/version: latest +spec: + definition: + scope: Namespaced + permissions: + # Create and monitor the experiment & helper pods + - apiGroups: [ "" ] + resources: [ "pods" ] + verbs: [ "create","delete","get","list","patch","update", "deletecollection" ] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "create","get","list","patch","update" ] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [ "" ] + resources: [ "pods/log" ] + verbs: [ "get","list","watch" ] + # for creating and managing to execute commands inside target container + - apiGroups: [ "" ] + resources: [ "pods/exec" ] + verbs: [ "get","list","create" ] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: [ "batch" ] + resources: [ "jobs" ] + verbs: [ "create","list","get","delete","deletecollection" ] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: [ "litmuschaos.io" ] + resources: [ "chaosengines","chaosexperiments","chaosresults" ] + verbs: [ "create","list","get","patch","update","delete" ] + image: "litmuschaos/go-runner:latest" + imagePullPolicy: Always + args: + - -c + - ./experiments -name spring-boot-memory-stress + command: + - /bin/bash + env: + + # it contains fraction of memory to be stressed(0.70 equals 70%) + # it supports value in range [0.01,0.95] + - name: MEMORY_FILL_FRACTION + value: '0.70' + + # port of the spring boot application + - name: CM_PORT + value: '' + + # it contains number of requests are to be attacked + # n value means nth request will be affected + - name: CM_LEVEL + value: '1' + + # it limits watched packages/classes/methods + - name: CM_WATCHED_CUSTOM_SERVICES + value: '' + + # provide name of watcher + # it supports controller, restController, service, repository, component, webClient + - name: CM_WATCHERS + value: 'restController' + + - name: TOTAL_CHAOS_DURATION + value: '30' + + ## percentage of total pods to target + - name: PODS_AFFECTED_PERC + value: '' + + ## Period to wait before and after injection of chaos + - name: RAMP_TIME + value: '' + + ## it defines the sequence of chaos execution for multiple target pods + ## supported values: serial, parallel + - name: SEQUENCE + value: 'parallel' + + ## env var that describes the library used to execute the chaos + ## default: litmus. Supported values: litmus + - name: LIB + value: 'litmus' + + labels: + name: spring-boot-memory-stress + app.kubernetes.io/part-of: litmus + app.kubernetes.io/component: experiment-job + app.kubernetes.io/version: latest diff --git a/charts/spring-boot/spring-boot-memory-stress/rbac.yaml b/charts/spring-boot/spring-boot-memory-stress/rbac.yaml new file mode 100644 index 0000000..4b46775 --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/rbac.yaml @@ -0,0 +1,61 @@ +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: spring-boot-memory-stress-sa + namespace: default + labels: + name: spring-boot-memory-stress-sa + app.kubernetes.io/part-of: litmus +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: spring-boot-memory-stress-sa + namespace: default + labels: + name: spring-boot-memory-stress-sa + app.kubernetes.io/part-of: litmus +rules: + # Create and monitor the experiment & helper pods + - apiGroups: [""] + resources: ["pods"] + verbs: ["create","delete","get","list","patch","update", "deletecollection"] + # Performs CRUD operations on the events inside chaosengine and chaosresult + - apiGroups: [""] + resources: ["events"] + verbs: ["create","get","list","patch","update"] + # Track and get the runner, experiment, and helper pods log + - apiGroups: [""] + resources: ["pods/log"] + verbs: ["get","list","watch"] + # for creating and managing to execute commands inside target container + - apiGroups: [""] + resources: ["pods/exec"] + verbs: ["get","list","create"] + # for configuring and monitor the experiment job by the chaos-runner pod + - apiGroups: ["batch"] + resources: ["jobs"] + verbs: ["create","list","get","delete","deletecollection"] + # for creation, status polling and deletion of litmus chaos resources used within a chaos workflow + - apiGroups: ["litmuschaos.io"] + resources: ["chaosengines","chaosexperiments","chaosresults"] + verbs: ["create","list","get","patch","update","delete"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + name: spring-boot-memory-stress-sa + namespace: default + labels: + name: spring-boot-memory-stress-sa + app.kubernetes.io/part-of: litmus +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: spring-boot-memory-stress-sa +subjects: +- kind: ServiceAccount + name: spring-boot-memory-stress-sa + namespace: default + diff --git a/charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml b/charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml new file mode 100644 index 0000000..568687c --- /dev/null +++ b/charts/spring-boot/spring-boot-memory-stress/spring-boot-memory-stress.chartserviceversion.yaml @@ -0,0 +1,49 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot-memory-stress + version: 0.1.0 + annotations: + categories: Spring Boot + vendor: CNCF + support: https://slack.kubernetes.io/ +spec: + displayName: spring-boot-memory-stress + categoryDescription: | + This experiment allows injecting Chaos Monkey memory-stress assaults on Spring Boot applications, which have the [Chaos Monkey for Spring Boot](https://codecentric.github.io/chaos-monkey-spring-boot/) in their classpath. + It can target random pods with a Spring Boot application and allows configuring the assaults to inject memory-stress. It tests the resiliency of the system when some applications are having unexpected faulty behavior. + keywords: + - Kubernetes + - K8S + - Spring Boot + - Pod + platforms: + - GKE + - Konvoy + - Packet(Kubeadm) + - Minikube + - EKS + maturity: alpha + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + labels: + app.kubernetes.io/component: chartserviceversion + app.kubernetes.io/version: latest + links: + - name: Source Code + url: https://github.com/litmuschaos/litmus-go/tree/master/experiments/spring-boot/spring-boot-memory-stress + - name: Documentation + url: https://litmuschaos.github.io/litmus/experiments/categories/spring-boot/spring-boot-memory-stress + - name: Video + url: + icon: + - url: + mediatype: "" + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot-memory-stress/experiment.yaml diff --git a/charts/spring-boot/spring-boot.chartserviceversion.yaml b/charts/spring-boot/spring-boot.chartserviceversion.yaml new file mode 100644 index 0000000..5f2409e --- /dev/null +++ b/charts/spring-boot/spring-boot.chartserviceversion.yaml @@ -0,0 +1,40 @@ +apiVersion: litmuchaos.io/v1alpha1 +kind: ChartServiceVersion +metadata: + createdAt: 2022-11-17T10:28:08Z + name: spring-boot + version: 0.1.0 + annotations: + categories: Spring Boot + chartDescription: Injects spring boot chaos +spec: + displayName: Spring Boot Chaos + categoryDescription: > + It contains chaos to disrupt state of spring-boot application. + experiments: + - spring-boot-app-kill + - spring-boot-cpu-stress + - spring-boot-memory-stress + - spring-boot-latency + - spring-boot-exceptions + - spring-boot-faults + keywords: + - Kubernetes + - Spring Boot + - K8S + - Pod + maintainers: + - name: Stephane Cazeaux + email: stephane.cazeaux@orange.com + - name: Shubham Chaudhary + email: shubham.chaudhary@harness.io + minKubeVersion: 1.12.0 + provider: + name: Orange + links: + - name: Documentation + url: https://spring.io/projects/spring-boot + icon: + - url: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot/icons/spring-boot.png + mediatype: image/png + chaosexpcrdlink: https://raw.githubusercontent.com/litmuschaos/chaos-charts/master/charts/spring-boot/experiments.yaml diff --git a/charts/spring-boot/spring-boot.package.yaml b/charts/spring-boot/spring-boot.package.yaml new file mode 100644 index 0000000..0347743 --- /dev/null +++ b/charts/spring-boot/spring-boot.package.yaml @@ -0,0 +1,20 @@ +packageName: spring-boot +experiments: + - name: spring-boot-app-kill + CSV: spring-boot-app-kill.chartserviceversion.yaml + desc: "spring-boot-app-kill" + - name: spring-boot-cpu-stress + CSV: spring-boot-cpu-stress.chartserviceversion.yaml + desc: "spring-boot-cpu-stress" + - name: spring-boot-memory-stress + CSV: spring-boot-memory-stress.chartserviceversion.yaml + desc: "spring-boot-memory-stress" + - name: spring-boot-latency + CSV: spring-boot-latency.chartserviceversion.yaml + desc: "spring-boot-latency" + - name: spring-boot-exceptions + CSV: spring-boot-exceptions.chartserviceversion.yaml + desc: "spring-boot-exceptions" + - name: spring-boot-faults + CSV: spring-boot-faults.chartserviceversion.yaml + desc: "spring-boot-faults" \ No newline at end of file