proofdock-chaos-azure 1.1.6

Last updated:

0 purchases

proofdock-chaos-azure 1.1.6 Image
proofdock-chaos-azure 1.1.6 Images
Add to Cart

Description:

proofdockchaosazure 1.1.6

Chaos Toolkit Extension for Azure



This project is a collection of actions and probes, gathered as an
extension to the Chaos Toolkit. It targets the Microsoft Azure platform.
Install
This package requires Python 3.5+
To be used from your experiment, this package must be installed in the Python
environment where chaostoolkit already lives.
$ pip install -U proofdock-chaos-azure

Usage
To use the probes and actions from this package, add the following to your
experiment file:
{
"type": "action",
"name": "start-chaos",
"provider": {
"type": "python",
"module": "pdchaosazure.vm.actions",
"func": "stop_machines",
"secrets": ["azure"],
"config": ["azure_subscription_id"]
}
}

That's it!
Please explore the code to see existing probes and actions.
Configuration
This extension uses the Azure SDK libraries under the hood. The Azure SDK library expects that you have a Tenant ID, Client ID, Client Secret as well as a Subscription ID, that allows you to authenticate with the Azure resource management API.
The extension will first try to load the configuration from the experiment file. If configuration is not provided in the Experiment file, it will try to load it from the Azure credential file.
Configuration in the Experiment file
Set Tenant ID, Client ID and Client Secret in the Experiment file as defined below:
{
"secrets": {
"azure": {
"client_id": "your-super-secret-client-id",
"client_secret": "your-even-more-super-secret-client-secret",
"tenant_id": "your-tenant-id"
}
}
}

Additionally you need to provide your Subscription ID as defined below:
{
"configuration": {
"azure_subscription_id": "your-azure-subscription-id"
}
}

If you are not working with Public Global Azure, e.g. China Cloud You can set the cloud environment as defined below:
{
"secrets": {
"azure": {
"azure_cloud": "AZURE_CHINA_CLOUD"
}
}
}

Available cloud names:

AZURE_CHINA_CLOUD
AZURE_GERMAN_CLOUD
AZURE_PUBLIC_CLOUD
AZURE_US_GOV_CLOUD


Tip
You can retrieve secrets and configuration values from environment or HashiCorp vault.

Configuration in the Azure credential file
Create the Azure credential file file using Azure Cli.
az login
az ad sp create-for-rbac --sdk-auth > credentials.json


Warning
If you're in an organization, you may not have permission in the subscription to run this command. In that case, contact the subscription owners to have them create the service principal for you.
You can find more information about format of the credential file and signing into Azure here.

Output of the command should create a following file (placeholder will contain your secrets):
{
"subscriptionId": "<azure_aubscription_id>",
"tenantId": "<tenant_id>",
"clientId": "<application_id>",
"clientSecret": "<application_secret>",
"activeDirectoryEndpointUrl": "https://login.microsoftonline.com",
"resourceManagerEndpointUrl": "https://management.azure.com/",
"activeDirectoryGraphResourceId": "https://graph.windows.net/",
"sqlManagementEndpointUrl": "https://management.core.windows.net:8443/",
"galleryEndpointUrl": "https://gallery.azure.com/",
"managementEndpointUrl": "https://management.core.windows.net/"
}

Store the path to the file in an environment variable called AZURE_AUTH_LOCATION and make sure that your Experiment file does NOT contain secrets section and azure_subscription_id.
Putting it all together
Here is a full example for an experiment containing secrets and configuration:
{
"version": "1.0.0",
"title": "...",
"description": "...",
"tags": ["azure", "kubernetes", "aks", "node"],
"configuration": {
"azure_subscription_id": "xxx"
},
"secrets": {
"azure": {
"client_id": "xxx",
"client_secret": "xxx",
"tenant_id": "xxx"
}
},
"steady-state-hypothesis": {
"title": "Services are all available and healthy",
"probes": [
{
"type": "probe",
"name": "consumer-service-must-still-respond",
"tolerance": 200,
"provider": {
"type": "http",
"url": "https://some-url/"
}
}
]
},
"method": [
{
"type": "action",
"name": "restart-node-at-random",
"provider": {
"type": "python",
"module": "pdchaosazure.vm.actions",
"func": "restart_machines",
"secrets": ["azure"],
"config": ["azure_subscription_id"]
}
}
],
"rollbacks": []
}

Filter arguments
This extension is making heavy use of the Kusto query language to filter those Azure resources that an experiment is targeting.
The Kusto query language in Azure is a read-only request to process data and return results. The request is stated in plain text, using a data-flow model designed to make the syntax easy to read.
Given that an Azure subscription contains the following Azure resources:
[
{
"name": "machine_1",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
},
{
"name": "machine_2",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
},
{
"name": "machine_1",
"resourceGroup": "another_resource_group",
"type": "Microsoft.Compute/virtualMachines"
}
]

With a filter you can ultimatively select the Azure resources that shall be attacked. For example:

where resourceGroup=='my_resource_group'' will select those machines for an attack
[
{
"name": "machine_1",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
},
{
"name": "machine_2",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
}
]


where name=='machine_1'' will select those machines for an attack
[
{
"name": "machine_1",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
},
{
"name": "machine_1",
"resourceGroup": "another_resource_group",
"type": "Microsoft.Compute/virtualMachines"
}
]


where name=='machine_1' and resourceGroup='my_resource_group'' will select
[
{
"name": "machine_1",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
}
]


If you want to randomly select one machine of your resource group you may do the following operation: where resourceGroup='my_resource_group'' | sample 1. The sample operator is generating randomness to your selection.
[
{
"name": "<one of your machines in the 'my_resource_group'>",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
}
]


If you omit the filter entirely one machine out your subscription (if any) is taken.

Kusto Query Language Light
At some places in the chaos experiment API some Azure resources are not supported for filtering with the Kusto Query Language (KQL). A prominent example are instances of a virtual machine scale set.
We decided to support you with an easy way of filtering for those kind of resources with a Kusto Query Language Light (KQLL) syntax. The KQLL defines a small subset of the KQL. Although only a small subset is offered it should serve the daily purposes when used in chaos experiments.
The KQLL defines:

where-clauses with and and or expressions
pipe | operators
take, top, and sample commands
Equality operators such as ==, >=, <=, >, and <
If you omit the KQLL filter one resource of the cluster is selected at random.
Those queries that provide the KQLL syntax will be marked as such in the activity's documentation.

Contribute
If you wish to contribute more functions to this package, you are more than welcome to do so. Please, fork this project, make your changes following the usual PEP 8 code style complemented with a flavor (defined in .flake8 file), sprinkling with tests and submit a PR for review.
The Proofdock Chaos CLI project requires all contributors to sign a Developer Certificate of Origin on each commit they would like to merge into the master branch of the repository. Please, make sure you can abide by the rules of the DCO before submitting a PR.
Develop
If you wish to develop on this project, make sure to install the development dependencies. But first, create a virtual environment and then install those dependencies.
$ pip install -r requirements-dev.txt -r requirements.txt

Then, point your environment to this directory:
$ python setup.py develop

Now, you can edit the files and they will be automatically be seen by your
environment, even when running from the chaos command locally.
Test
To run the tests for the project execute the following:
$ pytest

License:

For personal and professional use. You cannot resell or redistribute these repositories in their original state.

Customer Reviews

There are no reviews.