(refactor): Modify the Service Account names of the experiments (#145)

Signed-off-by: Udit Gaurav <uditgaurav@gmail.com>
This commit is contained in:
UDIT GAURAV
2020-02-15 00:15:40 +05:30
committed by GitHub
parent 7b710e3c2f
commit f4c7b188c7
42 changed files with 189 additions and 189 deletions

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: container-kill-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: container-kill-sa
namespace: default
labels:
name: nginx-sa
name: container-kill-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: container-kill-sa
namespace: default
labels:
name: nginx-sa
name: container-kill-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","jobs","daemonsets","pods/exec","chaosengines","chaosexperiments","chaosresults"]
@@ -22,16 +22,16 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: container-kill-sa
namespace: default
labels:
name: nginx-sa
name: container-kill-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: container-kill-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: container-kill-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: disk-fill-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: disk-fill-sa
namespace: default
labels:
name: nginx-sa
name: disk-fill-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: disk-fill-sa
labels:
name: nginx-sa
name: disk-fill-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch"]
resources: ["pods","jobs","pods/exec","daemonsets","chaosengines","chaosexperiments","chaosresults"]
@@ -21,14 +21,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: disk-fill-sa
labels:
name: nginx-sa
name: disk-fill-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: disk-fill-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: disk-fill-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: disk-loss-sa
monitoring: false
# It can be retain/delete
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: disk-loss-sa
namespace: default
labels:
name: nginx-sa
name: disk-loss-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: disk-loss-sa
labels:
name: nginx-sa
name: disk-loss-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","secrets","chaosengines","chaosexperiments","chaosresults"]
@@ -21,14 +21,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: disk-loss-sa
labels:
name: nginx-sa
name: disk-loss-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: disk-loss-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: disk-loss-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: node-cpu-hog-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: node-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: node-cpu-hog-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: node-cpu-hog-sa
labels:
name: nginx-sa
name: node-cpu-hog-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","daemonsets","jobs","pods/exec","chaosengines","chaosexperiments","chaosresults"]
@@ -24,14 +24,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: node-cpu-hog-sa
labels:
name: nginx-sa
name: node-cpu-hog-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: node-cpu-hog-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: node-cpu-hog-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: node-drain-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: node-drain-sa
namespace: default
labels:
name: nginx-sa
name: node-drain-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: node-drain-sa
labels:
name: nginx-sa
name: node-drain-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","extensions"]
resources: ["pods","jobs","chaosengines","daemonsets","pods/eviction","chaosexperiments","chaosresults"]
@@ -24,15 +24,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: node-drain-sa
labels:
name: nginx-sa
name: node-drain-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: node-drain-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: node-drain-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-cpu-hog-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: pod-cpu-hog-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: pod-cpu-hog-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -22,15 +22,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: pod-cpu-hog-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-cpu-hog-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
engineState: 'active'
#ex. values: ns1:name=percona,ns2:run=nginx
auxiliaryAppInfo: ''
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-delete-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-delete-sa
namespace: default
labels:
name: nginx-sa
name: pod-delete-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-delete-sa
namespace: default
labels:
name: nginx-sa
name: pod-delete-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","deployments","jobs","configmaps","chaosengines","chaosexperiments","chaosresults"]
@@ -25,16 +25,16 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-delete-sa
namespace: default
labels:
name: nginx-sa
name: pod-delete-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-delete-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-delete-sa
namespace: default

View File

@@ -18,7 +18,7 @@ spec:
# FYI, To see app label, apply kubectl get pods --show-labels
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-network-corruption-sa
experiments:
- name: pod-network-corruption
spec:

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-network-corruption-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-corruption-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-network-corruption-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-corruption-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -22,15 +22,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-network-corruption-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-corruption-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-network-corruption-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-network-corruption-sa
namespace: default

View File

@@ -18,7 +18,7 @@ spec:
# FYI, To see app label, apply kubectl get pods --show-labels
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-network-latency-sa
experiments:
- name: pod-network-latency
spec:

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-network-latency-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-latency-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-network-latency-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-latency-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -22,15 +22,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-network-latency-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-latency-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-network-latency-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-network-latency-sa
namespace: default

View File

@@ -19,7 +19,7 @@ spec:
# FYI, To see app label, apply kubectl get pods --show-labels
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-network-loss-sa
experiments:
- name: pod-network-loss
spec:

View File

@@ -1,18 +1,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-network-loss-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-loss-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-network-loss-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-loss-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -21,15 +21,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-network-loss-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-loss-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-network-loss-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-network-loss-sa
namespace: default