• Stars
    star
    1,781
  • Rank 26,129 (Top 0.6 %)
  • Language
    Go
  • License
    MIT License
  • Created about 8 years ago
  • Updated 4 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

chaoskube periodically kills random pods in your Kubernetes cluster.

chaoskube

Build Status Coverage Status GitHub release Docker Repository on Quay go-doc

chaoskube periodically kills random pods in your Kubernetes cluster.

chaoskube

Why

Test how your system behaves under arbitrary pod failures.

Example

Running it will kill a pod in any namespace every 10 minutes by default.

$ chaoskube
INFO[0000] starting up              dryRun=true interval=10m0s version=v0.21.0
INFO[0000] connecting to cluster    master="https://kube.you.me" serverVersion=v1.10.5+coreos.0
INFO[0000] setting pod filter       annotations= labels= minimumAge=0s namespaces=
INFO[0000] setting quiet times      daysOfYear="[]" timesOfDay="[]" weekdays="[]"
INFO[0000] setting timezone         location=UTC name=UTC offset=0
INFO[0001] terminating pod          name=kube-dns-v20-6ikos namespace=kube-system
INFO[0601] terminating pod          name=nginx-701339712-u4fr3 namespace=chaoskube
INFO[1201] terminating pod          name=kube-proxy-gke-earthcoin-pool-3-5ee87f80-n72s namespace=kube-system
INFO[1802] terminating pod          name=nginx-701339712-bfh2y namespace=chaoskube
INFO[2402] terminating pod          name=heapster-v1.2.0-1107848163-bhtcw namespace=kube-system
INFO[3003] terminating pod          name=l7-default-backend-v1.0-o2hc9 namespace=kube-system
INFO[3603] terminating pod          name=heapster-v1.2.0-1107848163-jlfcd namespace=kube-system
INFO[4203] terminating pod          name=nginx-701339712-bfh2y namespace=chaoskube
INFO[4804] terminating pod          name=nginx-701339712-51nt8 namespace=chaoskube
...

chaoskube allows to filter target pods by namespaces, labels, annotations and age as well as exclude certain weekdays, times of day and days of a year from chaos.

How

Helm

You can install chaoskube with Helm. Follow Helm's Quickstart Guide and then install the chaoskube chart.

$ helm repo add chaoskube https://linki.github.io/chaoskube/
$ helm install chaoskube chaoskube/chaoskube --atomic --namespace=chaoskube --create-namespace

Refer to chaoskube on kubeapps.com to learn how to configure it and to find other useful Helm charts.

Raw manifest

Refer to example manifest. Be sure to give chaoskube appropriate permissions using provided ClusterRole.

Configuration

By default chaoskube will be friendly and not kill anything. When you validated your target cluster you may disable dry-run mode by passing the flag --no-dry-run. You can also specify a more aggressive interval and other supported flags for your deployment.

If you're running in a Kubernetes cluster and want to target the same cluster then this is all you need to do.

If you want to target a different cluster or want to run it locally specify your cluster via the --master flag or provide a valid kubeconfig via the --kubeconfig flag. By default, it uses your standard kubeconfig path in your home. That means, whatever is the current context in there will be targeted.

If you want to increase or decrease the amount of chaos change the interval between killings with the --interval flag. Alternatively, you can increase the number of replicas of your chaoskube deployment.

Remember that chaoskube by default kills any pod in all your namespaces, including system pods and itself.

chaoskube provides a simple HTTP endpoint that can be used to check that it is running. This can be used for Kubernetes liveness and readiness probes. By default, this listens on port 8080. To disable, pass --metrics-address="" to chaoskube.

Filtering targets

However, you can limit the search space of chaoskube by providing label, annotation, and namespace selectors, pod name include/exclude patterns, as well as a minimum age setting.

$ chaoskube --labels 'app=mate,chaos,stage!=production'
...
INFO[0000] setting pod filter       labels="app=mate,chaos,stage!=production"

This selects all pods that have the label app set to mate, the label chaos set to anything and the label stage not set to production or unset.

You can filter target pods by namespace selector as well.

$ chaoskube --namespaces 'default,testing,staging'
...
INFO[0000] setting pod filter       namespaces="default,staging,testing"

This will filter for pods in the three namespaces default, staging and testing.

Namespaces can additionally be filtered by a namespace label selector.

$ chaoskube --namespace-labels='!integration'
...
INFO[0000] setting pod filter       namespaceLabels="!integration"

This will exclude all pods from namespaces with the label integration.

You can filter target pods by OwnerReference's kind selector.

$ chaoskube --kinds '!DaemonSet,!StatefulSet'
...
INFO[0000] setting pod filter       kinds="!DaemonSet,!StatefulSet"

This will exclude any DaemonSet and StatefulSet pods.

$ chaoskube --kinds 'DaemonSet'
...
INFO[0000] setting pod filter       kinds="DaemonSet"

This will only include any DaemonSet pods.

Please note: any include filter will automatically exclude all the pods with no OwnerReference defined.

You can filter pods by name:

$ chaoskube --included-pod-names 'foo|bar' --excluded-pod-names 'prod'
...
INFO[0000] setting pod filter       excludedPodNames=prod includedPodNames="foo|bar"

This will cause only pods whose name contains 'foo' or 'bar' and does not contain 'prod' to be targeted.

You can also exclude namespaces and mix and match with the label and annotation selectors.

$ chaoskube \
    --labels 'app=mate,chaos,stage!=production' \
    --annotations '!scheduler.alpha.kubernetes.io/critical-pod' \
    --namespaces '!kube-system,!production'
...
INFO[0000] setting pod filter       annotations="!scheduler.alpha.kubernetes.io/critical-pod" labels="app=mate,chaos,stage!=production" namespaces="!kube-system,!production"

This further limits the search space of the above label selector by also excluding any pods in the kube-system and production namespaces as well as ignore all pods that are marked as critical.

The annotation selector can also be used to run chaoskube as a cluster addon and allow pods to opt-in to being terminated as you see fit. For example, you could run chaoskube like this:

$ chaoskube --annotations 'chaos.alpha.kubernetes.io/enabled=true' --debug
...
INFO[0000] setting pod filter       annotations="chaos.alpha.kubernetes.io/enabled=true"
DEBU[0000] found candidates         count=0
DEBU[0000] no victim found

Unless you already use that annotation somewhere, this will initially ignore all of your pods (you can see the number of candidates in debug mode). You could then selectively opt-in individual deployments to chaos mode by annotating their pods with chaos.alpha.kubernetes.io/enabled=true.

apiVersion: apps/v1
kind: Deployment
metadata:
  name: my-app
spec:
  replicas: 3
  template:
    metadata:
      annotations:
        chaos.alpha.kubernetes.io/enabled: "true"
    spec:
      ...

You can exclude pods that have recently started by using the --minimum-age flag.

$ chaoskube --minimum-age 6h
...
INFO[0000] setting pod filter       minimumAge=6h0m0s

Limit the Chaos

You can limit the time when chaos is introduced by weekdays, time periods of a day, day of a year or all of them together.

Add a comma-separated list of abbreviated weekdays via the --excluded-weekdays options, a comma-separated list of time periods via the --excluded-times-of-day option and/or a comma-separated list of days of a year via the --excluded-days-of-year option and specify a --timezone by which to interpret them.

$ chaoskube \
    --excluded-weekdays=Sat,Sun \
    --excluded-times-of-day=22:00-08:00,11:00-13:00 \
    --excluded-days-of-year=Apr1,Dec24 \
    --timezone=Europe/Berlin
...
INFO[0000] setting quiet times      daysOfYear="[Apr 1 Dec24]" timesOfDay="[22:00-08:00 11:00-13:00]" weekdays="[Saturday Sunday]"
INFO[0000] setting timezone         location=Europe/Berlin name=CET offset=1

Use UTC, Local or pick a timezone name from the (IANA) tz database. If you're testing chaoskube from your local machine then Local makes the most sense. Once you deploy chaoskube to your cluster you should deploy it with a specific timezone, e.g. where most of your team members are living, so that both your team and chaoskube have a common understanding when a particular weekday begins and ends, for instance. If your team is spread across multiple time zones it's probably best to pick UTC which is also the default. Picking the wrong timezone shifts the meaning of a particular weekday by a couple of hours between you and the server.

Flags

Option Environment Description Default
--interval CHAOSKUBE_INTERVAL interval between pod terminations 10m
--labels CHAOSKUBE_LABELS label selector to filter pods by (matches everything)
--annotations CHAOSKUBE_ANNOTATIONS annotation selector to filter pods by (matches everything)
--kinds CHAOSKUBE_KINDS owner's kind selector to filter pods by (all kinds)
--namespaces CHAOSKUBE_NAMESPACES namespace selector to filter pods by (all namespaces)
--namespace-labels CHAOSKUBE_NAMESPACE_LABELS label selector to filter namespaces and its pods by (all namespaces)
--included-pod-names CHAOSKUBE_INCLUDED_POD_NAMES regular expression pattern for pod names to include (all included)
--excluded-pod-names CHAOSKUBE_EXCLUDED_POD_NAMES regular expression pattern for pod names to exclude (none excluded)
--excluded-weekdays CHAOSKUBE_EXCLUDED_WEEKDAYS weekdays when chaos is to be suspended, e.g. "Sat,Sun" (no weekday excluded)
--excluded-times-of-day CHAOSKUBE_EXCLUDED_TIMES_OF_DAY times of day when chaos is to be suspended, e.g. "22:00-08:00" (no times of day excluded)
--excluded-days-of-year CHAOSKUBE_EXCLUDED_DAYS_OF_YEAR days of a year when chaos is to be suspended, e.g. "Apr1,Dec24" (no days of year excluded)
--timezone CHAOSKUBE_TIMEZONE timezone from tz database, e.g. "America/New_York", "UTC" or "Local" (UTC)
--max-runtime CHAOSKUBE_MAX_RUNTIME Maximum runtime before chaoskube exits -1s (infinite time)
--max-kill CHAOSKUBE_MAX_KILL Specifies the maximum number of pods to be terminated per interval 1
--minimum-age CHAOSKUBE_MINIMUM_AGE Minimum age to filter pods by 0s (matches every pod)
--dry-run CHAOSKUBE_DRY_RUN don't kill pods, only log what would have been done true
--log-format CHAOSKUBE_LOG_FORMAT specify the format of the log messages. Options are text and json text
--log-caller CHAOSKUBE_LOG_CALLER include the calling function name and location in the log messages false
--slack-webhook CHAOSKUBE_SLACK_WEBHOOK The address of the slack webhook for notifications disabled
--client-namespace-scope CHAOSKUBE_CLIENT_NAMESPACE_SCOPE Scope Kubernetes API calls to the given namespace (all namespaces)

Related work

There are several other projects that allow you to create some chaos in your Kubernetes cluster.

  • kube-monkey is a sophisticated pod-based chaos monkey for Kubernetes. Each morning it compiles a schedule of pod terminations that should happen throughout the day. It allows to specify a mean time between failures on a per-pod basis, a feature that chaoskube lacks. It can also be made aware of groups of pods forming an application so that it can treat them specially, e.g. kill all pods of an application at once. kube-mokey allows filtering targets globally via configuration options as well allows pods to opt-in to chaos via annotations,it allows individual apps to opt-in in their own unique way, as an example, app-a can request to kill him each week day one pod, while app-b which more couragues can request to kill 50% of pods. It understands a similar configuration file used by Netflix's ChaosMonkey.
  • PowerfulSeal is indeed a powerful tool to trouble your Kubernetes setup. Besides killing pods it can also take out your Cloud VMs or kill your Docker daemon. It has a vast number of configuration options to define what can be killed and when. It also has an interactive mode that allows you to kill pods easily.
  • fabric8's chaos monkey: A chaos monkey that comes bundled as an app with fabric8's Kubernetes platform. It can be deployed via a UI and reports any actions taken as a chat message and/or desktop notification. It can be configured with an interval and a pod name pattern that possible targets must match.
  • k8aos: An interactive tool that can issue a series of random pod deletions across an entire Kubernetes cluster or scoped to a namespace.
  • pod-reaper kills pods based on an interval and a configurable chaos chance. It allows to specify possible target pods via a label selector and namespace. It has the ability successfully shutdown itself after a while and therefore might be suited to work well with Kubernetes Job objects. It can also be configured to kill every pod that has been running for longer than a configurable duration.
  • kubernetes-pod-chaos-monkey: A very simple random pod killer using kubectl written in a couple lines of bash. Given a namespace and an interval it kills a random pod in that namespace at each interval. Pretty much like chaoskube worked in the beginning.
  • kubeinvaders gamified chaos engineering tool for Kubernetes. It is like Space Invaders but the aliens are pods or worker nodes.

Acknowledgements

This project wouldn't be where it is with the ideas and help of several awesome contributors:

Contributing

Feel free to create issues or submit pull requests.

More Repositories

1

mate

Deprecated: Mate manages AWS Route53 and Google CloudDNS records for your Kubernetes services and ingresses. (moved from https://github.com/zalando-incubator/mate)
Go
114
star
2

cloudformation-operator

A Kubernetes operator for managing CloudFormation stacks via a CustomResource
Go
102
star
3

instrumented_http

A Go http.RoundTripper that exports request statistics via Prometheus.
Go
21
star
4

cryptoprom

CryptoProm is a Prometheus metrics exporter for Cryptocurrency market prices.
Ruby
20
star
5

ethereum-deploy

Kubernetes deployment manifests for an Ethereum 2 Prysm Validator (testnet only and a little bit outdated)
12
star
6

snapshot-controller

Snapshot Controller snapshots the GCE Persistent Disks that are backing your Kubernetes Persistent Volumes. (Deprecated: use https://github.com/heptio/ark instead)
Go
10
star
7

0x-go

[Experimental] A collection of tools relating to Ethereum's 0xProject (v2)
Go
9
star
8

publishable

Adds simple publishing functionality to your active record models
Ruby
7
star
9

armor-ingress-controller

A Kubernetes Ingress Controller for @labstack's Armor
Go
6
star
10

etherdelta-go

EtherDelta bindings for Go and example code
Go
5
star
11

openproject-docker

openproject dockerfiles and friends (wip)
Nginx
4
star
12

twp

Java
3
star
13

encrypted-secrets

Go
2
star
14

thief

Ruby
2
star
15

rng

An easy to use random number generator with distributions
C++
2
star
16

manifest-controller

manifest-controller watches remote Kubernetes manifests and applies them to your cluster.
Go
1
star
17

k8s-proxy

standalone transparent kubectl proxy supporting exec
Go
1
star
18

wanchain-cli

CLI for a Wanchain RPC endpoint
Go
1
star
19

ngntracker

bug & issue tracker, not quite done yet. no further development for now
Ruby
1
star
20

earthcoin-1.2

Deprecated EarthCoin Qt Wallet
TypeScript
1
star
21

Android_Pusher

A simple pusher implementation and activity for Android!
Java
1
star
22

vohl-immobilien

JavaScript
1
star
23

dnsseed

checks your cryptocoin's dnsseed response node count
Ruby
1
star
24

errbit-docker

Dockerfile for running errbit
1
star
25

getter_for

Adds getter methods for attributes that the object belongs to
Ruby
1
star
26

earthcoin-docker

Runs an EarthCoin node on Mainnet inside a Docker container.
Shell
1
star
27

moinmoin

collection of hello world snippets for various libs and languages
Shell
1
star
28

process_monitor

A /proc based process and thread monitor
C++
1
star