(refactor): Modify the Service Account names of the experiments (#145)

Signed-off-by: Udit Gaurav <uditgaurav@gmail.com>
This commit is contained in:
UDIT GAURAV
2020-02-15 00:15:40 +05:30
committed by GitHub
parent 7b710e3c2f
commit f4c7b188c7
42 changed files with 189 additions and 189 deletions

View File

@@ -14,7 +14,7 @@ spec:
engineState: 'active'
#ex. values: ns1:name=percona,ns2:run=nginx
auxiliaryAppInfo: ''
chaosServiceAccount: coredns-sa
chaosServiceAccount: coredns-pod-delete-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -1,17 +1,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: coredns-sa
name: coredns-pod-delete-sa
namespace: kube-system
labels:
name: coredns-sa
name: coredns-pod-delete-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: coredns-sa
name: coredns-pod-delete-sa
labels:
name: coredns-sa
name: coredns-pod-delete-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["services", "pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -20,14 +20,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: coredns-sa
name: coredns-pod-delete-sa
labels:
name: coredns-sa
name: coredns-pod-delete-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: coredns-sa
name: coredns-pod-delete-sa
subjects:
- kind: ServiceAccount
name: coredns-sa
name: coredns-pod-delete-sa
namespace: kube-system

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: container-kill-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: container-kill-sa
namespace: default
labels:
name: nginx-sa
name: container-kill-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: container-kill-sa
namespace: default
labels:
name: nginx-sa
name: container-kill-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","jobs","daemonsets","pods/exec","chaosengines","chaosexperiments","chaosresults"]
@@ -22,16 +22,16 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: container-kill-sa
namespace: default
labels:
name: nginx-sa
name: container-kill-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: container-kill-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: container-kill-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: disk-fill-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: disk-fill-sa
namespace: default
labels:
name: nginx-sa
name: disk-fill-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: disk-fill-sa
labels:
name: nginx-sa
name: disk-fill-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch"]
resources: ["pods","jobs","pods/exec","daemonsets","chaosengines","chaosexperiments","chaosresults"]
@@ -21,14 +21,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: disk-fill-sa
labels:
name: nginx-sa
name: disk-fill-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: disk-fill-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: disk-fill-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: disk-loss-sa
monitoring: false
# It can be retain/delete
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: disk-loss-sa
namespace: default
labels:
name: nginx-sa
name: disk-loss-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: disk-loss-sa
labels:
name: nginx-sa
name: disk-loss-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","secrets","chaosengines","chaosexperiments","chaosresults"]
@@ -21,14 +21,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: disk-loss-sa
labels:
name: nginx-sa
name: disk-loss-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: disk-loss-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: disk-loss-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: node-cpu-hog-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: node-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: node-cpu-hog-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: node-cpu-hog-sa
labels:
name: nginx-sa
name: node-cpu-hog-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","daemonsets","jobs","pods/exec","chaosengines","chaosexperiments","chaosresults"]
@@ -24,14 +24,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: node-cpu-hog-sa
labels:
name: nginx-sa
name: node-cpu-hog-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: node-cpu-hog-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: node-cpu-hog-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: node-drain-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: node-drain-sa
namespace: default
labels:
name: nginx-sa
name: node-drain-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: node-drain-sa
labels:
name: nginx-sa
name: node-drain-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","extensions"]
resources: ["pods","jobs","chaosengines","daemonsets","pods/eviction","chaosexperiments","chaosresults"]
@@ -24,15 +24,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: node-drain-sa
labels:
name: nginx-sa
name: node-drain-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: node-drain-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: node-drain-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-cpu-hog-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: pod-cpu-hog-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: pod-cpu-hog-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -22,15 +22,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default
labels:
name: nginx-sa
name: pod-cpu-hog-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-cpu-hog-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-cpu-hog-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
engineState: 'active'
#ex. values: ns1:name=percona,ns2:run=nginx
auxiliaryAppInfo: ''
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-delete-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-delete-sa
namespace: default
labels:
name: nginx-sa
name: pod-delete-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-delete-sa
namespace: default
labels:
name: nginx-sa
name: pod-delete-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","deployments","jobs","configmaps","chaosengines","chaosexperiments","chaosresults"]
@@ -25,16 +25,16 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-delete-sa
namespace: default
labels:
name: nginx-sa
name: pod-delete-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-delete-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-delete-sa
namespace: default

View File

@@ -18,7 +18,7 @@ spec:
# FYI, To see app label, apply kubectl get pods --show-labels
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-network-corruption-sa
experiments:
- name: pod-network-corruption
spec:

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-network-corruption-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-corruption-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-network-corruption-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-corruption-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -22,15 +22,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-network-corruption-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-corruption-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-network-corruption-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-network-corruption-sa
namespace: default

View File

@@ -18,7 +18,7 @@ spec:
# FYI, To see app label, apply kubectl get pods --show-labels
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-network-latency-sa
experiments:
- name: pod-network-latency
spec:

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-network-latency-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-latency-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-network-latency-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-latency-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -22,15 +22,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-network-latency-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-latency-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-network-latency-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-network-latency-sa
namespace: default

View File

@@ -19,7 +19,7 @@ spec:
# FYI, To see app label, apply kubectl get pods --show-labels
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pod-network-loss-sa
experiments:
- name: pod-network-loss
spec:

View File

@@ -1,18 +1,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pod-network-loss-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-loss-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: nginx-sa
name: pod-network-loss-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-loss-sa
rules:
- apiGroups: ["","litmuschaos.io","batch"]
resources: ["pods","jobs","chaosengines","chaosexperiments","chaosresults"]
@@ -21,15 +21,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: RoleBinding
metadata:
name: nginx-sa
name: pod-network-loss-sa
namespace: default
labels:
name: nginx-sa
name: pod-network-loss-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: nginx-sa
name: pod-network-loss-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pod-network-loss-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=cp-kafka'
appkind: 'statefulset'
chaosServiceAccount: kafka-sa
chaosServiceAccount: kafka-broker-disk-failure-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,17 +2,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: kafka-sa
name: kafka-broker-disk-failure-sa
namespace: default
labels:
name: kafka-sa
name: kafka-broker-disk-failure-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: kafka-sa
name: kafka-broker-disk-failure-sa
labels:
name: kafka-sa
name: kafka-broker-disk-failure-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","jobs","pods/exec","statefulsets","secrets","chaosengines","chaosexperiments","chaosresults"]
@@ -21,15 +21,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: kafka-sa
name: kafka-broker-disk-failure-sa
labels:
name: kafka-sa
name: kafka-broker-disk-failure-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kafka-role
name: kafka-broker-disk-failure-sa
subjects:
- kind: ServiceAccount
name: kafka-sa
name: kafka-broker-disk-failure-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=cp-kafka'
appkind: 'statefulset'
chaosServiceAccount: kafka-sa
chaosServiceAccount: kafka-broker-pod-failure-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -1,17 +1,17 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: kafka-sa
name: kafka-broker-pod-failure-sa
namespace: default
labels:
name: kafka-sa
name: kafka-broker-pod-failure-sa
---
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: kafka-sa
name: kafka-broker-pod-failure-sa
labels:
name: kafka-sa
name: kafka-broker-pod-failure-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps"]
resources: ["pods","deployments","jobs","pods/exec","statefulsets","configmaps","chaosengines","chaosexperiments","chaosresults"]
@@ -23,14 +23,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: kafka-sa
name: kafka-broker-pod-failure-sa
labels:
name: kafka-sa
name: kafka-broker-pod-failure-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kafka-role
name: kafka-broker-pod-failure-sa
subjects:
- kind: ServiceAccount
name: kafka-sa
name: kafka-broker-pod-failure-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pool-container-failure-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pool-container-failure-sa
namespace: default
labels:
name: nginx-sa
name: pool-container-failure-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: pool-container-failure-sa
labels:
name: nginx-sa
name: pool-container-failure-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io",openebs.io"]
resources: ["pods","jobs","daemonsets","replicasets","pods/exec","configmaps","secrets","persistentvolumeclaims","cstorvolumereplicas","chaosexperiments","chaosresults","chaosengines"]
@@ -22,14 +22,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: pool-container-failure-sa
labels:
name: nginx-sa
name: pool-container-failure-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: pool-container-failure-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pool-container-failure-sa
namespace: default

View File

@@ -9,7 +9,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pool-network-delay-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -1,18 +1,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pool-network-delay-sa
namespace: openebs
labels:
name: nginx-sa
name: pool-network-delay-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: pool-network-delay-sa
labels:
name: nginx-sa
name: pool-network-delay-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io","openebs.io"]
resources: ["pods","pods/exec","jobs","configmaps","services","persistentvolumeclaims","storageclasses","persistentvolumes","chaosengines","chaosexperiments","chaosresults","cstorpools","cstorvolumereplicas","replicasets"]
@@ -21,14 +21,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: pool-network-delay-sa
labels:
name: nginx-sa
name: pool-network-delay-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: pool-network-delay-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pool-network-delay-sa
namespace: openebs

View File

@@ -12,7 +12,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pool-network-loss-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pool-network-loss-sa
namespace: openebs
labels:
name: nginx-sa
name: pool-network-loss-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: pool-network-loss-sa
labels:
name: nginx-sa
name: pool-network-loss-sa
rules:
- apiGroups:
- ""
@@ -50,14 +50,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: pool-network-loss-sa
labels:
name: nginx-sa
name: pool-network-loss-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: pool-network-loss-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pool-network-loss-sa
namespace: openebs

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: pool-pod-failure-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: pool-pod-failure-sa
namespace: default
labels:
name: nginx-sa
name: pool-pod-failure-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: pool-pod-failure-sa
labels:
name: nginx-sa
name: pool-pod-failure-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io","openebs.io"]
resources: ["pods","jobs","deployments","configmaps","secrets","replicasets","persistentvolumeclaims","storageclasses","cstorvolumereplicas","chaosexperiments","chaosresults","chaosengines"]
@@ -25,14 +25,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: pool-pod-failure-sa
labels:
name: nginx-sa
name: pool-pod-failure-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: pool-pod-failure-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: pool-pod-failure-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=percona'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: target-container-failure-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: target-container-failure-sa
namespace: default
labels:
name: nginx-sa
name: target-container-failure-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: target-container-failure-sa
labels:
name: nginx-sa
name: target-container-failure-sa
rules:
- apiGroups: ["","litmuschaos.io","batch","apps","storage.k8s.io"]
resources: ["pods","jobs","pods/exec","configmaps","secrets","persistentvolumeclaims","storageclasses","persistentvolumes","chaosengines","chaosexperiments","chaosresults"]
@@ -22,14 +22,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: target-container-failure-sa
labels:
name: nginx-sa
name: target-container-failure-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: target-container-failure-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: target-container-failure-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: target-network-delay-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: target-network-delay-sa
namespace: default
labels:
name: nginx-sa
name: target-network-delay-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: target-network-delay-sa
labels:
name: nginx-sa
name: target-network-delay-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io"]
resources: ["pods","pods/exec","jobs","configmaps","secrets","services","persistentvolumeclaims","storageclasses","persistentvolumes","chaosexperiments","chaosresults","chaosengines"]
@@ -22,14 +22,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: target-network-delay-sa
labels:
name: nginx-sa
name: target-network-delay-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: target-network-delay-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: target-network-delay-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=nginx'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: target-network-loss-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: target-network-loss-sa
namespace: default
labels:
name: nginx-sa
name: target-network-loss-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: target-network-loss-sa
labels:
name: nginx-sa
name: target-network-loss-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io"]
resources: ["pods","pods/exec","jobs","configmaps","secrets","services","persistentvolumeclaims","storageclasses","persistentvolumes","chaosexperiments","chaosresults","chaosengines"]
@@ -22,14 +22,14 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: target-network-loss-sa
labels:
name: nginx-sa
name: target-network-loss-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: target-network-loss-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: target-network-loss-sa
namespace: default

View File

@@ -14,7 +14,7 @@ spec:
appns: 'default'
applabel: 'app=percona'
appkind: 'deployment'
chaosServiceAccount: nginx-sa
chaosServiceAccount: target-pod-failure-sa
monitoring: false
# It can be delete/retain
jobCleanUpPolicy: 'delete'

View File

@@ -2,18 +2,18 @@
apiVersion: v1
kind: ServiceAccount
metadata:
name: nginx-sa
name: target-pod-failure-sa
namespace: default
labels:
name: nginx-sa
name: target-pod-failure-sa
---
# Source: openebs/templates/clusterrole.yaml
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: nginx-sa
name: target-pod-failure-sa
labels:
name: nginx-sa
name: target-pod-failure-sa
rules:
- apiGroups: ["","apps","litmuschaos.io","batch","extensions","storage.k8s.io"]
resources: ["pods","jobs","deployments","pods/exec","chaosexperiments","chaosresults","chaosengines","configmaps","secrets","services,"persistentvolumeclaims","storageclasses","persistentvolumes"]
@@ -25,15 +25,15 @@ rules:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: nginx-sa
name: target-pod-failure-sa
labels:
name: nginx-sa
name: target-pod-failure-sa
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: nginx-sa
name: target-pod-failure-sa
subjects:
- kind: ServiceAccount
name: nginx-sa
name: target-pod-failure-sa
namespace: default