diff --git a/charts/coredns/coredns-pod-delete/engine.yaml b/charts/coredns/coredns-pod-delete/engine.yaml index 038affe..97a742b 100644 --- a/charts/coredns/coredns-pod-delete/engine.yaml +++ b/charts/coredns/coredns-pod-delete/engine.yaml @@ -14,7 +14,7 @@ spec: engineState: 'active' #ex. values: ns1:name=percona,ns2:run=nginx auxiliaryAppInfo: '' - chaosServiceAccount: coredns-sa + chaosServiceAccount: coredns-pod-delete-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/coredns/coredns-pod-delete/rbac.yaml b/charts/coredns/coredns-pod-delete/rbac.yaml index 19be64e..7a7f7b7 100644 --- a/charts/coredns/coredns-pod-delete/rbac.yaml +++ b/charts/coredns/coredns-pod-delete/rbac.yaml @@ -1,17 +1,17 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: coredns-sa + name: coredns-pod-delete-sa namespace: kube-system labels: - name: coredns-sa + name: coredns-pod-delete-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: coredns-sa + name: coredns-pod-delete-sa labels: - name: coredns-sa + name: coredns-pod-delete-sa rules: - apiGroups: ["","litmuschaos.io","batch"] resources: ["services", "pods","jobs","chaosengines","chaosexperiments","chaosresults"] @@ -20,14 +20,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: coredns-sa + name: coredns-pod-delete-sa labels: - name: coredns-sa + name: coredns-pod-delete-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: coredns-sa + name: coredns-pod-delete-sa subjects: - kind: ServiceAccount - name: coredns-sa + name: coredns-pod-delete-sa namespace: kube-system diff --git a/charts/generic/container-kill/engine.yaml b/charts/generic/container-kill/engine.yaml index 373a1c0..7d1896a 100644 --- a/charts/generic/container-kill/engine.yaml +++ b/charts/generic/container-kill/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: container-kill-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/generic/container-kill/rbac.yaml b/charts/generic/container-kill/rbac.yaml index 4021474..a5f8b89 100644 --- a/charts/generic/container-kill/rbac.yaml +++ b/charts/generic/container-kill/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: container-kill-sa namespace: default labels: - name: nginx-sa + name: container-kill-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: - name: nginx-sa + name: container-kill-sa namespace: default labels: - name: nginx-sa + name: container-kill-sa rules: - apiGroups: ["","litmuschaos.io","batch","apps"] resources: ["pods","jobs","daemonsets","pods/exec","chaosengines","chaosexperiments","chaosresults"] @@ -22,16 +22,16 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: - name: nginx-sa + name: container-kill-sa namespace: default labels: - name: nginx-sa + name: container-kill-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: Role - name: nginx-sa + name: container-kill-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: container-kill-sa namespace: default diff --git a/charts/generic/disk-fill/engine.yaml b/charts/generic/disk-fill/engine.yaml index ecb0c73..b8a5171 100644 --- a/charts/generic/disk-fill/engine.yaml +++ b/charts/generic/disk-fill/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: disk-fill-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/generic/disk-fill/rbac.yaml b/charts/generic/disk-fill/rbac.yaml index 97f62ba..b4e580e 100644 --- a/charts/generic/disk-fill/rbac.yaml +++ b/charts/generic/disk-fill/rbac.yaml @@ -2,17 +2,17 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: disk-fill-sa namespace: default labels: - name: nginx-sa + name: disk-fill-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: disk-fill-sa labels: - name: nginx-sa + name: disk-fill-sa rules: - apiGroups: ["","apps","litmuschaos.io","batch"] resources: ["pods","jobs","pods/exec","daemonsets","chaosengines","chaosexperiments","chaosresults"] @@ -21,14 +21,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: disk-fill-sa labels: - name: nginx-sa + name: disk-fill-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: disk-fill-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: disk-fill-sa namespace: default diff --git a/charts/generic/disk-loss/engine.yaml b/charts/generic/disk-loss/engine.yaml index 2c52b56..cf671b9 100644 --- a/charts/generic/disk-loss/engine.yaml +++ b/charts/generic/disk-loss/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: disk-loss-sa monitoring: false # It can be retain/delete jobCleanUpPolicy: 'delete' diff --git a/charts/generic/disk-loss/rbac.yaml b/charts/generic/disk-loss/rbac.yaml index 9d2a40b..a5563ce 100644 --- a/charts/generic/disk-loss/rbac.yaml +++ b/charts/generic/disk-loss/rbac.yaml @@ -2,17 +2,17 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: disk-loss-sa namespace: default labels: - name: nginx-sa + name: disk-loss-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: disk-loss-sa labels: - name: nginx-sa + name: disk-loss-sa rules: - apiGroups: ["","litmuschaos.io","batch"] resources: ["pods","jobs","secrets","chaosengines","chaosexperiments","chaosresults"] @@ -21,14 +21,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: disk-loss-sa labels: - name: nginx-sa + name: disk-loss-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: disk-loss-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: disk-loss-sa namespace: default diff --git a/charts/generic/node-cpu-hog/engine.yaml b/charts/generic/node-cpu-hog/engine.yaml index 4450f2d..f66151f 100644 --- a/charts/generic/node-cpu-hog/engine.yaml +++ b/charts/generic/node-cpu-hog/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: node-cpu-hog-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/generic/node-cpu-hog/rbac.yaml b/charts/generic/node-cpu-hog/rbac.yaml index 6d24154..a3cab16 100644 --- a/charts/generic/node-cpu-hog/rbac.yaml +++ b/charts/generic/node-cpu-hog/rbac.yaml @@ -2,17 +2,17 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: node-cpu-hog-sa namespace: default labels: - name: nginx-sa + name: node-cpu-hog-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: node-cpu-hog-sa labels: - name: nginx-sa + name: node-cpu-hog-sa rules: - apiGroups: ["","litmuschaos.io","batch","apps"] resources: ["pods","daemonsets","jobs","pods/exec","chaosengines","chaosexperiments","chaosresults"] @@ -24,14 +24,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: node-cpu-hog-sa labels: - name: nginx-sa + name: node-cpu-hog-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: node-cpu-hog-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: node-cpu-hog-sa namespace: default diff --git a/charts/generic/node-drain/engine.yaml b/charts/generic/node-drain/engine.yaml index 985674a..85adde1 100644 --- a/charts/generic/node-drain/engine.yaml +++ b/charts/generic/node-drain/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: node-drain-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/generic/node-drain/rbac.yaml b/charts/generic/node-drain/rbac.yaml index 68208fb..578f8b7 100644 --- a/charts/generic/node-drain/rbac.yaml +++ b/charts/generic/node-drain/rbac.yaml @@ -2,17 +2,17 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: node-drain-sa namespace: default labels: - name: nginx-sa + name: node-drain-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: node-drain-sa labels: - name: nginx-sa + name: node-drain-sa rules: - apiGroups: ["","litmuschaos.io","batch","extensions"] resources: ["pods","jobs","chaosengines","daemonsets","pods/eviction","chaosexperiments","chaosresults"] @@ -24,15 +24,15 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: node-drain-sa labels: - name: nginx-sa + name: node-drain-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: node-drain-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: node-drain-sa namespace: default diff --git a/charts/generic/pod-cpu-hog/engine.yaml b/charts/generic/pod-cpu-hog/engine.yaml index 2a928db..697ef4e 100644 --- a/charts/generic/pod-cpu-hog/engine.yaml +++ b/charts/generic/pod-cpu-hog/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pod-cpu-hog-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/generic/pod-cpu-hog/rbac.yaml b/charts/generic/pod-cpu-hog/rbac.yaml index 044384e..6c9642d 100644 --- a/charts/generic/pod-cpu-hog/rbac.yaml +++ b/charts/generic/pod-cpu-hog/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pod-cpu-hog-sa namespace: default labels: - name: nginx-sa + name: pod-cpu-hog-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: - name: nginx-sa + name: pod-cpu-hog-sa namespace: default labels: - name: nginx-sa + name: pod-cpu-hog-sa rules: - apiGroups: ["","litmuschaos.io","batch"] resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"] @@ -22,15 +22,15 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: - name: nginx-sa + name: pod-cpu-hog-sa namespace: default labels: - name: nginx-sa + name: pod-cpu-hog-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: Role - name: nginx-sa + name: pod-cpu-hog-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pod-cpu-hog-sa namespace: default diff --git a/charts/generic/pod-delete/engine.yaml b/charts/generic/pod-delete/engine.yaml index c91f3b7..ef0ab34 100644 --- a/charts/generic/pod-delete/engine.yaml +++ b/charts/generic/pod-delete/engine.yaml @@ -14,7 +14,7 @@ spec: engineState: 'active' #ex. values: ns1:name=percona,ns2:run=nginx auxiliaryAppInfo: '' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pod-delete-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/generic/pod-delete/rbac.yaml b/charts/generic/pod-delete/rbac.yaml index 427bf75..f2df841 100644 --- a/charts/generic/pod-delete/rbac.yaml +++ b/charts/generic/pod-delete/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pod-delete-sa namespace: default labels: - name: nginx-sa + name: pod-delete-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: - name: nginx-sa + name: pod-delete-sa namespace: default labels: - name: nginx-sa + name: pod-delete-sa rules: - apiGroups: ["","litmuschaos.io","batch","apps"] resources: ["pods","deployments","jobs","configmaps","chaosengines","chaosexperiments","chaosresults"] @@ -25,16 +25,16 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: - name: nginx-sa + name: pod-delete-sa namespace: default labels: - name: nginx-sa + name: pod-delete-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: Role - name: nginx-sa + name: pod-delete-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pod-delete-sa namespace: default diff --git a/charts/generic/pod-network-corruption/engine.yaml b/charts/generic/pod-network-corruption/engine.yaml index aaeb759..fb258b1 100644 --- a/charts/generic/pod-network-corruption/engine.yaml +++ b/charts/generic/pod-network-corruption/engine.yaml @@ -18,7 +18,7 @@ spec: # FYI, To see app label, apply kubectl get pods --show-labels applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pod-network-corruption-sa experiments: - name: pod-network-corruption spec: diff --git a/charts/generic/pod-network-corruption/rbac.yaml b/charts/generic/pod-network-corruption/rbac.yaml index 044384e..7aabce3 100644 --- a/charts/generic/pod-network-corruption/rbac.yaml +++ b/charts/generic/pod-network-corruption/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pod-network-corruption-sa namespace: default labels: - name: nginx-sa + name: pod-network-corruption-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: - name: nginx-sa + name: pod-network-corruption-sa namespace: default labels: - name: nginx-sa + name: pod-network-corruption-sa rules: - apiGroups: ["","litmuschaos.io","batch"] resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"] @@ -22,15 +22,15 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: - name: nginx-sa + name: pod-network-corruption-sa namespace: default labels: - name: nginx-sa + name: pod-network-corruption-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: Role - name: nginx-sa + name: pod-network-corruption-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pod-network-corruption-sa namespace: default diff --git a/charts/generic/pod-network-latency/engine.yaml b/charts/generic/pod-network-latency/engine.yaml index 295d99c..2bfbd22 100644 --- a/charts/generic/pod-network-latency/engine.yaml +++ b/charts/generic/pod-network-latency/engine.yaml @@ -18,7 +18,7 @@ spec: # FYI, To see app label, apply kubectl get pods --show-labels applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pod-network-latency-sa experiments: - name: pod-network-latency spec: diff --git a/charts/generic/pod-network-latency/rbac.yaml b/charts/generic/pod-network-latency/rbac.yaml index 044384e..6a62eb0 100644 --- a/charts/generic/pod-network-latency/rbac.yaml +++ b/charts/generic/pod-network-latency/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pod-network-latency-sa namespace: default labels: - name: nginx-sa + name: pod-network-latency-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: - name: nginx-sa + name: pod-network-latency-sa namespace: default labels: - name: nginx-sa + name: pod-network-latency-sa rules: - apiGroups: ["","litmuschaos.io","batch"] resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"] @@ -22,15 +22,15 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: - name: nginx-sa + name: pod-network-latency-sa namespace: default labels: - name: nginx-sa + name: pod-network-latency-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: Role - name: nginx-sa + name: pod-network-latency-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pod-network-latency-sa namespace: default diff --git a/charts/generic/pod-network-loss/engine.yaml b/charts/generic/pod-network-loss/engine.yaml index bba18b7..f8d964d 100644 --- a/charts/generic/pod-network-loss/engine.yaml +++ b/charts/generic/pod-network-loss/engine.yaml @@ -19,7 +19,7 @@ spec: # FYI, To see app label, apply kubectl get pods --show-labels applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pod-network-loss-sa experiments: - name: pod-network-loss spec: diff --git a/charts/generic/pod-network-loss/rbac.yaml b/charts/generic/pod-network-loss/rbac.yaml index 25bd2a5..51a1d1d 100644 --- a/charts/generic/pod-network-loss/rbac.yaml +++ b/charts/generic/pod-network-loss/rbac.yaml @@ -1,18 +1,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pod-network-loss-sa namespace: default labels: - name: nginx-sa + name: pod-network-loss-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: Role metadata: - name: nginx-sa + name: pod-network-loss-sa namespace: default labels: - name: nginx-sa + name: pod-network-loss-sa rules: - apiGroups: ["","litmuschaos.io","batch"] resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"] @@ -21,15 +21,15 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: RoleBinding metadata: - name: nginx-sa + name: pod-network-loss-sa namespace: default labels: - name: nginx-sa + name: pod-network-loss-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: Role - name: nginx-sa + name: pod-network-loss-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pod-network-loss-sa namespace: default diff --git a/charts/kafka/kafka-broker-disk-failure/engine.yaml b/charts/kafka/kafka-broker-disk-failure/engine.yaml index a176769..a23872e 100644 --- a/charts/kafka/kafka-broker-disk-failure/engine.yaml +++ b/charts/kafka/kafka-broker-disk-failure/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=cp-kafka' appkind: 'statefulset' - chaosServiceAccount: kafka-sa + chaosServiceAccount: kafka-broker-disk-failure-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/kafka/kafka-broker-disk-failure/rbac.yaml b/charts/kafka/kafka-broker-disk-failure/rbac.yaml index 82ff684..d0caee3 100644 --- a/charts/kafka/kafka-broker-disk-failure/rbac.yaml +++ b/charts/kafka/kafka-broker-disk-failure/rbac.yaml @@ -2,17 +2,17 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: kafka-sa + name: kafka-broker-disk-failure-sa namespace: default labels: - name: kafka-sa + name: kafka-broker-disk-failure-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: kafka-sa + name: kafka-broker-disk-failure-sa labels: - name: kafka-sa + name: kafka-broker-disk-failure-sa rules: - apiGroups: ["","litmuschaos.io","batch","apps"] resources: ["pods","jobs","pods/exec","statefulsets","secrets","chaosengines","chaosexperiments","chaosresults"] @@ -21,15 +21,15 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: kafka-sa + name: kafka-broker-disk-failure-sa labels: - name: kafka-sa + name: kafka-broker-disk-failure-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: kafka-role + name: kafka-broker-disk-failure-sa subjects: - kind: ServiceAccount - name: kafka-sa + name: kafka-broker-disk-failure-sa namespace: default diff --git a/charts/kafka/kafka-broker-pod-failure/engine.yaml b/charts/kafka/kafka-broker-pod-failure/engine.yaml index 2c1626b..8f88bab 100644 --- a/charts/kafka/kafka-broker-pod-failure/engine.yaml +++ b/charts/kafka/kafka-broker-pod-failure/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=cp-kafka' appkind: 'statefulset' - chaosServiceAccount: kafka-sa + chaosServiceAccount: kafka-broker-pod-failure-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/kafka/kafka-broker-pod-failure/rbac.yaml b/charts/kafka/kafka-broker-pod-failure/rbac.yaml index de725fe..cdef23d 100644 --- a/charts/kafka/kafka-broker-pod-failure/rbac.yaml +++ b/charts/kafka/kafka-broker-pod-failure/rbac.yaml @@ -1,17 +1,17 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: kafka-sa + name: kafka-broker-pod-failure-sa namespace: default labels: - name: kafka-sa + name: kafka-broker-pod-failure-sa --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: kafka-sa + name: kafka-broker-pod-failure-sa labels: - name: kafka-sa + name: kafka-broker-pod-failure-sa rules: - apiGroups: ["","litmuschaos.io","batch","apps"] resources: ["pods","deployments","jobs","pods/exec","statefulsets","configmaps","chaosengines","chaosexperiments","chaosresults"] @@ -23,14 +23,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: kafka-sa + name: kafka-broker-pod-failure-sa labels: - name: kafka-sa + name: kafka-broker-pod-failure-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: kafka-role + name: kafka-broker-pod-failure-sa subjects: - kind: ServiceAccount - name: kafka-sa + name: kafka-broker-pod-failure-sa namespace: default diff --git a/charts/openebs/openebs-pool-container-failure/engine.yaml b/charts/openebs/openebs-pool-container-failure/engine.yaml index f663fb3..bc24b22 100644 --- a/charts/openebs/openebs-pool-container-failure/engine.yaml +++ b/charts/openebs/openebs-pool-container-failure/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pool-container-failure-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-pool-container-failure/rbac.yaml b/charts/openebs/openebs-pool-container-failure/rbac.yaml index d1f9fc2..31f75ff 100644 --- a/charts/openebs/openebs-pool-container-failure/rbac.yaml +++ b/charts/openebs/openebs-pool-container-failure/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pool-container-failure-sa namespace: default labels: - name: nginx-sa + name: pool-container-failure-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: pool-container-failure-sa labels: - name: nginx-sa + name: pool-container-failure-sa rules: - apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io",openebs.io"] resources: ["pods","jobs","daemonsets","replicasets","pods/exec","configmaps","secrets","persistentvolumeclaims","cstorvolumereplicas","chaosexperiments","chaosresults","chaosengines"] @@ -22,14 +22,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: pool-container-failure-sa labels: - name: nginx-sa + name: pool-container-failure-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: pool-container-failure-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pool-container-failure-sa namespace: default diff --git a/charts/openebs/openebs-pool-network-delay/engine.yaml b/charts/openebs/openebs-pool-network-delay/engine.yaml index de00f75..6827431 100644 --- a/charts/openebs/openebs-pool-network-delay/engine.yaml +++ b/charts/openebs/openebs-pool-network-delay/engine.yaml @@ -9,7 +9,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pool-network-delay-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-pool-network-delay/rbac.yml b/charts/openebs/openebs-pool-network-delay/rbac.yml index acb82c0..a373bd8 100644 --- a/charts/openebs/openebs-pool-network-delay/rbac.yml +++ b/charts/openebs/openebs-pool-network-delay/rbac.yml @@ -1,18 +1,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pool-network-delay-sa namespace: openebs labels: - name: nginx-sa + name: pool-network-delay-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: pool-network-delay-sa labels: - name: nginx-sa + name: pool-network-delay-sa rules: - apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io","openebs.io"] resources: ["pods","pods/exec","jobs","configmaps","services","persistentvolumeclaims","storageclasses","persistentvolumes","chaosengines","chaosexperiments","chaosresults","cstorpools","cstorvolumereplicas","replicasets"] @@ -21,14 +21,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: pool-network-delay-sa labels: - name: nginx-sa + name: pool-network-delay-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: pool-network-delay-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pool-network-delay-sa namespace: openebs \ No newline at end of file diff --git a/charts/openebs/openebs-pool-network-loss/engine.yaml b/charts/openebs/openebs-pool-network-loss/engine.yaml index fd00156..bcf3302 100644 --- a/charts/openebs/openebs-pool-network-loss/engine.yaml +++ b/charts/openebs/openebs-pool-network-loss/engine.yaml @@ -12,7 +12,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pool-network-loss-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-pool-network-loss/rbac.yml b/charts/openebs/openebs-pool-network-loss/rbac.yml index 2937233..21db88b 100644 --- a/charts/openebs/openebs-pool-network-loss/rbac.yml +++ b/charts/openebs/openebs-pool-network-loss/rbac.yml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pool-network-loss-sa namespace: openebs labels: - name: nginx-sa + name: pool-network-loss-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: pool-network-loss-sa labels: - name: nginx-sa + name: pool-network-loss-sa rules: - apiGroups: - "" @@ -50,14 +50,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: pool-network-loss-sa labels: - name: nginx-sa + name: pool-network-loss-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: pool-network-loss-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pool-network-loss-sa namespace: openebs diff --git a/charts/openebs/openebs-pool-pod-failure/engine.yaml b/charts/openebs/openebs-pool-pod-failure/engine.yaml index 8e67cc8..25fac4e 100644 --- a/charts/openebs/openebs-pool-pod-failure/engine.yaml +++ b/charts/openebs/openebs-pool-pod-failure/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: pool-pod-failure-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-pool-pod-failure/rbac.yaml b/charts/openebs/openebs-pool-pod-failure/rbac.yaml index 3443a9f..30f1a6b 100644 --- a/charts/openebs/openebs-pool-pod-failure/rbac.yaml +++ b/charts/openebs/openebs-pool-pod-failure/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: pool-pod-failure-sa namespace: default labels: - name: nginx-sa + name: pool-pod-failure-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: pool-pod-failure-sa labels: - name: nginx-sa + name: pool-pod-failure-sa rules: - apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io","openebs.io"] resources: ["pods","jobs","deployments","configmaps","secrets","replicasets","persistentvolumeclaims","storageclasses","cstorvolumereplicas","chaosexperiments","chaosresults","chaosengines"] @@ -25,14 +25,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: pool-pod-failure-sa labels: - name: nginx-sa + name: pool-pod-failure-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: pool-pod-failure-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: pool-pod-failure-sa namespace: default diff --git a/charts/openebs/openebs-target-container-failure/engine.yaml b/charts/openebs/openebs-target-container-failure/engine.yaml index 40e54e6..9d54835 100644 --- a/charts/openebs/openebs-target-container-failure/engine.yaml +++ b/charts/openebs/openebs-target-container-failure/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=percona' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: target-container-failure-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-target-container-failure/rbac.yaml b/charts/openebs/openebs-target-container-failure/rbac.yaml index fdb3bb3..840ad97 100644 --- a/charts/openebs/openebs-target-container-failure/rbac.yaml +++ b/charts/openebs/openebs-target-container-failure/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: target-container-failure-sa namespace: default labels: - name: nginx-sa + name: target-container-failure-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: target-container-failure-sa labels: - name: nginx-sa + name: target-container-failure-sa rules: - apiGroups: ["","litmuschaos.io","batch","apps","storage.k8s.io"] resources: ["pods","jobs","pods/exec","configmaps","secrets","persistentvolumeclaims","storageclasses","persistentvolumes","chaosengines","chaosexperiments","chaosresults"] @@ -22,14 +22,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: target-container-failure-sa labels: - name: nginx-sa + name: target-container-failure-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: target-container-failure-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: target-container-failure-sa namespace: default diff --git a/charts/openebs/openebs-target-network-delay/engine.yaml b/charts/openebs/openebs-target-network-delay/engine.yaml index ce9608f..5f0571b 100644 --- a/charts/openebs/openebs-target-network-delay/engine.yaml +++ b/charts/openebs/openebs-target-network-delay/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: target-network-delay-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-target-network-delay/rbac.yaml b/charts/openebs/openebs-target-network-delay/rbac.yaml index abf0ac5..26ecd6c 100644 --- a/charts/openebs/openebs-target-network-delay/rbac.yaml +++ b/charts/openebs/openebs-target-network-delay/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: target-network-delay-sa namespace: default labels: - name: nginx-sa + name: target-network-delay-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: target-network-delay-sa labels: - name: nginx-sa + name: target-network-delay-sa rules: - apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io"] resources: ["pods","pods/exec","jobs","configmaps","secrets","services","persistentvolumeclaims","storageclasses","persistentvolumes","chaosexperiments","chaosresults","chaosengines"] @@ -22,14 +22,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: target-network-delay-sa labels: - name: nginx-sa + name: target-network-delay-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: target-network-delay-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: target-network-delay-sa namespace: default diff --git a/charts/openebs/openebs-target-network-loss/engine.yaml b/charts/openebs/openebs-target-network-loss/engine.yaml index 4f62ad6..192d731 100644 --- a/charts/openebs/openebs-target-network-loss/engine.yaml +++ b/charts/openebs/openebs-target-network-loss/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=nginx' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: target-network-loss-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-target-network-loss/rbac.yaml b/charts/openebs/openebs-target-network-loss/rbac.yaml index abf0ac5..9f23d73 100644 --- a/charts/openebs/openebs-target-network-loss/rbac.yaml +++ b/charts/openebs/openebs-target-network-loss/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: target-network-loss-sa namespace: default labels: - name: nginx-sa + name: target-network-loss-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: target-network-loss-sa labels: - name: nginx-sa + name: target-network-loss-sa rules: - apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io"] resources: ["pods","pods/exec","jobs","configmaps","secrets","services","persistentvolumeclaims","storageclasses","persistentvolumes","chaosexperiments","chaosresults","chaosengines"] @@ -22,14 +22,14 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: target-network-loss-sa labels: - name: nginx-sa + name: target-network-loss-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: target-network-loss-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: target-network-loss-sa namespace: default diff --git a/charts/openebs/openebs-target-pod-failure/engine.yaml b/charts/openebs/openebs-target-pod-failure/engine.yaml index 4072605..017611d 100644 --- a/charts/openebs/openebs-target-pod-failure/engine.yaml +++ b/charts/openebs/openebs-target-pod-failure/engine.yaml @@ -14,7 +14,7 @@ spec: appns: 'default' applabel: 'app=percona' appkind: 'deployment' - chaosServiceAccount: nginx-sa + chaosServiceAccount: target-pod-failure-sa monitoring: false # It can be delete/retain jobCleanUpPolicy: 'delete' diff --git a/charts/openebs/openebs-target-pod-failure/rbac.yaml b/charts/openebs/openebs-target-pod-failure/rbac.yaml index ed0ffab..c434ca1 100644 --- a/charts/openebs/openebs-target-pod-failure/rbac.yaml +++ b/charts/openebs/openebs-target-pod-failure/rbac.yaml @@ -2,18 +2,18 @@ apiVersion: v1 kind: ServiceAccount metadata: - name: nginx-sa + name: target-pod-failure-sa namespace: default labels: - name: nginx-sa + name: target-pod-failure-sa --- # Source: openebs/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRole metadata: - name: nginx-sa + name: target-pod-failure-sa labels: - name: nginx-sa + name: target-pod-failure-sa rules: - apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io"] resources: ["pods","jobs","deployments","pods/exec","chaosexperiments","chaosresults","chaosengines","configmaps","secrets","services,"persistentvolumeclaims","storageclasses","persistentvolumes"] @@ -25,15 +25,15 @@ rules: apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: - name: nginx-sa + name: target-pod-failure-sa labels: - name: nginx-sa + name: target-pod-failure-sa roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole - name: nginx-sa + name: target-pod-failure-sa subjects: - kind: ServiceAccount - name: nginx-sa + name: target-pod-failure-sa namespace: default