Skip to content

Commit 6f3592a

Browse files
committed
main github action fix
Signed-off-by: Tullio Sebastiani <[email protected]> main github action fix Signed-off-by: Tullio Sebastiani <[email protected]> elastic password Signed-off-by: Tullio Sebastiani <[email protected]> typo Signed-off-by: Tullio Sebastiani <[email protected]> config fix Signed-off-by: Tullio Sebastiani <[email protected]>
1 parent c54390d commit 6f3592a

File tree

2 files changed

+48
-45
lines changed

2 files changed

+48
-45
lines changed

.github/workflows/tests.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@ jobs:
4242
4343
- name: Deploy test workloads
4444
run: |
45-
es_pod_name=$(kubectl get pods -l "app.kubernetes.io/instance=elasticsearch" -o name)
45+
es_pod_name=$(kubectl get pods -l "app=elasticsearch-master" -o name)
46+
echo "POD_NAME: $es_pod_name"
4647
kubectl --namespace default port-forward $es_pod_name 9200 &
4748
prom_name=$(kubectl get pods -n monitoring -l "app.kubernetes.io/name=prometheus" -o name)
4849
kubectl --namespace monitoring port-forward $prom_name 9090 &
@@ -73,6 +74,7 @@ jobs:
7374
yq -i '.elastic.elastic_port=9200' CI/config/common_test_config.yaml
7475
yq -i '.elastic.elastic_url="https://localhost"' CI/config/common_test_config.yaml
7576
yq -i '.elastic.enable_elastic=True' CI/config/common_test_config.yaml
77+
yq -i '.elastic.password=${{env.ELASTIC_PASSWORD}}' CI/config/common_test_config.yaml
7678
yq -i '.performance_monitoring.prometheus_url="http://localhost:9090"' CI/config/common_test_config.yaml
7779
echo "test_service_hijacking" > ./CI/tests/functional_tests
7880
echo "test_app_outages" >> ./CI/tests/functional_tests
@@ -104,6 +106,7 @@ jobs:
104106
yq -i '.kraken.signal_address="0.0.0.0"' CI/config/common_test_config.yaml
105107
yq -i '.kraken.performance_monitoring="localhost:9090"' CI/config/common_test_config.yaml
106108
yq -i '.elastic.enable_elastic=True' CI/config/common_test_config.yaml
109+
yq -i '.elastic.password="${{env.ELASTIC_PASSWORD}}"' CI/config/common_test_config.yaml
107110
yq -i '.elastic.elastic_port=9200' CI/config/common_test_config.yaml
108111
yq -i '.elastic.elastic_url="https://localhost"' CI/config/common_test_config.yaml
109112
yq -i '.performance_monitoring.prometheus_url="http://localhost:9090"' CI/config/common_test_config.yaml

config/config.yaml

Lines changed: 44 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
kraken:
2-
kubeconfig_path: ~/.kube/config # Path to kubeconfig
2+
kubeconfig_path: ~/Scrap/maybank-cluster/auth/kubeconfig # Path to kubeconfig
33
exit_on_failure: False # Exit when a post action scenario fails
44
auto_rollback: True # Enable auto rollback for scenarios.
55
rollback_versions_directory: /tmp/kraken-rollback # Directory to store rollback version files.
@@ -8,50 +8,50 @@ kraken:
88
signal_address: 0.0.0.0 # Signal listening address
99
port: 8081 # Signal port
1010
chaos_scenarios:
11-
# List of policies/chaos scenarios to load
12-
- hog_scenarios:
13-
- scenarios/kube/cpu-hog.yml
14-
- scenarios/kube/memory-hog.yml
15-
- scenarios/kube/io-hog.yml
16-
- application_outages_scenarios:
17-
- scenarios/openshift/app_outage.yaml
18-
- container_scenarios: # List of chaos pod scenarios to load
19-
- scenarios/openshift/container_etcd.yml
20-
- pod_network_scenarios:
21-
- scenarios/openshift/network_chaos_ingress.yml
22-
- scenarios/openshift/pod_network_outage.yml
23-
- pod_disruption_scenarios:
24-
- scenarios/openshift/etcd.yml
25-
- scenarios/openshift/regex_openshift_pod_kill.yml
26-
- scenarios/openshift/prom_kill.yml
27-
- scenarios/openshift/openshift-apiserver.yml
28-
- scenarios/openshift/openshift-kube-apiserver.yml
29-
- node_scenarios: # List of chaos node scenarios to load
30-
- scenarios/openshift/aws_node_scenarios.yml
31-
- scenarios/openshift/vmware_node_scenarios.yml
32-
- scenarios/openshift/ibmcloud_node_scenarios.yml
33-
- time_scenarios: # List of chaos time scenarios to load
34-
- scenarios/openshift/time_scenarios_example.yml
35-
- cluster_shut_down_scenarios:
36-
- scenarios/openshift/cluster_shut_down_scenario.yml
37-
- service_disruption_scenarios:
38-
- scenarios/openshift/regex_namespace.yaml
39-
- scenarios/openshift/ingress_namespace.yaml
40-
- zone_outages_scenarios:
41-
- scenarios/openshift/zone_outage.yaml
42-
- pvc_scenarios:
43-
- scenarios/openshift/pvc_scenario.yaml
44-
- network_chaos_scenarios:
45-
- scenarios/openshift/network_chaos.yaml
46-
- service_hijacking_scenarios:
47-
- scenarios/kube/service_hijacking.yaml
48-
- syn_flood_scenarios:
49-
- scenarios/kube/syn_flood.yaml
11+
# # List of policies/chaos scenarios to load
12+
# - hog_scenarios:
13+
# - scenarios/kube/cpu-hog.yml
14+
# - scenarios/kube/memory-hog.yml
15+
# - scenarios/kube/io-hog.yml
16+
# - application_outages_scenarios:
17+
# - scenarios/openshift/app_outage.yaml
18+
# - container_scenarios: # List of chaos pod scenarios to load
19+
# - scenarios/openshift/container_etcd.yml
20+
# - pod_network_scenarios:
21+
# - scenarios/openshift/network_chaos_ingress.yml
22+
# - scenarios/openshift/pod_network_outage.yml
23+
# - pod_disruption_scenarios:
24+
# - scenarios/openshift/etcd.yml
25+
# - scenarios/openshift/regex_openshift_pod_kill.yml
26+
# - scenarios/openshift/prom_kill.yml
27+
# - scenarios/openshift/openshift-apiserver.yml
28+
# - scenarios/openshift/openshift-kube-apiserver.yml
29+
# - node_scenarios: # List of chaos node scenarios to load
30+
# - scenarios/openshift/aws_node_scenarios.yml
31+
# - scenarios/openshift/vmware_node_scenarios.yml
32+
# - scenarios/openshift/ibmcloud_node_scenarios.yml
33+
# - time_scenarios: # List of chaos time scenarios to load
34+
# - scenarios/openshift/time_scenarios_example.yml
35+
# - cluster_shut_down_scenarios:
36+
# - scenarios/openshift/cluster_shut_down_scenario.yml
37+
# - service_disruption_scenarios:
38+
# - scenarios/openshift/regex_namespace.yaml
39+
# - scenarios/openshift/ingress_namespace.yaml
40+
# - zone_outages_scenarios:
41+
# - scenarios/openshift/zone_outage.yaml
42+
# - pvc_scenarios:
43+
# - scenarios/openshift/pvc_scenario.yaml
44+
# - network_chaos_scenarios:
45+
# - scenarios/openshift/network_chaos.yaml
46+
# - service_hijacking_scenarios:
47+
# - scenarios/kube/service_hijacking.yaml
48+
# - syn_flood_scenarios:
49+
# - scenarios/kube/syn_flood.yaml
5050
- network_chaos_ng_scenarios:
5151
- scenarios/kube/pod-network-filter.yml
52-
- scenarios/kube/node-network-filter.yml
53-
- kubevirt_vm_outage:
54-
- scenarios/kubevirt/kubevirt-vm-outage.yaml
52+
# - scenarios/kube/node-network-filter.yml
53+
# - kubevirt_vm_outage:
54+
# - scenarios/kubevirt/kubevirt-vm-outage.yaml
5555

5656
cerberus:
5757
cerberus_enabled: False # Enable it when cerberus is previously installed
@@ -79,7 +79,7 @@ elastic:
7979
telemetry_index: "krkn-telemetry"
8080

8181
tunings:
82-
wait_duration: 60 # Duration to wait between each chaos scenario
82+
wait_duration: 1 # Duration to wait between each chaos scenario
8383
iterations: 1 # Number of times to execute the scenarios
8484
daemon_mode: False # Iterations are set to infinity which means that the kraken will cause chaos forever
8585
telemetry:

0 commit comments

Comments
 (0)