Following node chaos scenarios are supported:
- node_start_scenario: scenario to stop the node instance.
- node_stop_scenario: scenario to stop the node instance.
- node_stop_start_scenario: scenario to stop and then start the node instance.
- node_termination_scenario: scenario to terminate the node instance.
- node_reboot_scenario: scenario to reboot the node instance.
- stop_kubelet_scenario: scenario to stop the kubelet of the node instance.
- stop_start_kubelet_scenario: scenario to stop and start the kubelet of the node instance.
- node_crash_scenario: scenario to crash the node instance.
- stop_start_helper_node_scenario: scenario to stop and start the helper node and check service status.
NOTE: If the node doesn't recover from the node_crash_scenario injection, reboot the node to get it back to Ready state.
NOTE: node_start_scenario, node_stop_scenario, node_stop_start_scenario, node_termination_scenario, node_reboot_scenario and stop_start_kubelet_scenario are supported only on AWS and GCP as of now.
NOTE: For clusters with AWS make sure AWS CLI is installed and properly configured using an AWS account
NOTE: For clusters with GCP make sure GCP CLI is installed.
A google service account is required to give proper authentication to GCP for node actions. See here for how to create a service account.
NOTE: A user with 'resourcemanager.projects.setIamPolicy' permission is required to grant project-level permissions to the service account.
After creating the service account you'll need to enable the account using the following: export GOOGLE_APPLICATION_CREDENTIALS="<serviceaccount.json>"
NOTE: For clusters with OPENSTACK Cloud, ensure to create and source the OPENSTACK RC file to set the OPENSTACK environment variables from the server where Kraken runs.
The supported node level chaos scenarios on an OPENSTACK cloud are node_stop_start_scenario
, stop_start_kubelet_scenario
and node_reboot_scenario
.
NOTE: For stop_start_helper_node_scenario
, visit here to learn more about the helper node and its usage.
To execute the scenario, ensure the value for ssh_private_key
in the node scenarios config file is set with the correct private key file path for ssh connection to the helper node. Ensure passwordless ssh is configured on the host running Kraken and the helper node to avoid connection errors.
NOTE: For Azure node killing scenarios, make sure Azure CLI is installed
You will also need to create a service principal and give it the correct access, see here for creating the service principal and setting the proper permissions
To properly run the service principal requires “Azure Active Directory Graph/Application.ReadWrite.OwnedBy” api permission granted and “User Access Administrator”
Before running you'll need to set the following:
-
Login using
az login
-
export AZURE_TENANT_ID=<tenant_id>
-
export AZURE_CLIENT_SECRET=<client secret>
-
export AZURE_CLIENT_ID=<client id>
NOTE: The node_crash_scenario
and stop_kubelet_scenario
scenario is supported independent of the cloud platform.
Use 'generic' or do not add the 'cloud_type' key to your scenario if your cluster is not set up using one of the current supported cloud types
Node scenarios can be injected by placing the node scenarios config files under node_scenarios option in the kraken config. Refer to node_scenarios_example config file.
node_scenarios:
- actions: # node chaos scenarios to be injected
- node_stop_start_scenario
- stop_start_kubelet_scenario
- node_crash_scenario
node_name: # node on which scenario has to be injected
label_selector: node-role.kubernetes.io/worker # when node_name is not specified, a node with matching label_selector is selected for node chaos scenario injection
instance_kill_count: 1 # number of times to inject each scenario under actions
timeout: 120 # duration to wait for completion of node scenario injection
cloud_type: aws # cloud type on which Kubernetes/OpenShift runs
- actions:
- node_reboot_scenario
node_name:
label_selector: node-role.kubernetes.io/infra
instance_kill_count: 1
timeout: 120
cloud_type: azure
- actions:
- node_crash_scenario
node_name:
label_selector: node-role.kubernetes.io/infra
instance_kill_count: 1
timeout: 120
- actions:
- stop_start_helper_node_scenario # node chaos scenario for helper node
instance_kill_count: 1
timeout: 120
helper_node_ip: # ip address of the helper node
service: # check status of the services on the helper node
- haproxy
- dhcpd
- named
ssh_private_key: /root/.ssh/id_rsa # ssh key to access the helper node
cloud_type: openstack