Extend the Chaos Toolkit and the Chaos Engineering Platform with capabilities for Microsoft Azure
Project description
Chaos Toolkit Extension for Azure
This project is a collection of actions and probes, gathered as an extension to the Chaos Toolkit. It targets the Microsoft Azure platform.
Install
This package requires Python 3.5+
To be used from your experiment, this package must be installed in the Python environment where chaostoolkit already lives.
$ pip install -U proofdock-chaos-azure
Usage
To use the probes and actions from this package, add the following to your experiment file:
{
"type": "action",
"name": "start-chaos",
"provider": {
"type": "python",
"module": "pdchaosazure.vm.actions",
"func": "stop_machines",
"secrets": ["azure"],
"config": ["azure_subscription_id"]
}
}
That's it!
Please explore the code to see existing probes and actions.
Configuration
This extension uses the Azure SDK libraries under the hood. The Azure SDK library expects that you have a Tenant ID
, Client ID
, Client Secret
as well as a Subscription ID
, that allows you to authenticate with the Azure resource management API.
The extension will first try to load the configuration from the experiment file
. If configuration is not provided in the Experiment file
, it will try to load it from the Azure credential file
.
Configuration in the Experiment file
Set Tenant ID
, Client ID
and Client Secret
in the Experiment file
as defined below:
{
"secrets": {
"azure": {
"client_id": "your-super-secret-client-id",
"client_secret": "your-even-more-super-secret-client-secret",
"tenant_id": "your-tenant-id"
}
}
}
Additionally you need to provide your Subscription ID
as defined below:
{
"configuration": {
"azure_subscription_id": "your-azure-subscription-id"
}
}
If you are not working with Public Global Azure, e.g. China Cloud You can set the cloud environment as defined below:
{
"secrets": {
"azure": {
"azure_cloud": "AZURE_CHINA_CLOUD"
}
}
}
Available cloud names:
- AZURE_CHINA_CLOUD
- AZURE_GERMAN_CLOUD
- AZURE_PUBLIC_CLOUD
- AZURE_US_GOV_CLOUD
Tip You can retrieve secrets and configuration values from environment or HashiCorp vault.
Configuration in the Azure credential file
Create the Azure credential file
file using Azure Cli
.
az login
az ad sp create-for-rbac --sdk-auth > credentials.json
Warning If you're in an organization, you may not have permission in the subscription to run this command. In that case, contact the subscription owners to have them create the service principal for you. You can find more information about format of the credential file and signing into Azure here.
Output of the command should create a following file (placeholder will contain your secrets):
{
"subscriptionId": "<azure_aubscription_id>",
"tenantId": "<tenant_id>",
"clientId": "<application_id>",
"clientSecret": "<application_secret>",
"activeDirectoryEndpointUrl": "https://login.microsoftonline.com",
"resourceManagerEndpointUrl": "https://management.azure.com/",
"activeDirectoryGraphResourceId": "https://graph.windows.net/",
"sqlManagementEndpointUrl": "https://management.core.windows.net:8443/",
"galleryEndpointUrl": "https://gallery.azure.com/",
"managementEndpointUrl": "https://management.core.windows.net/"
}
Store the path to the file in an environment variable called AZURE_AUTH_LOCATION and make sure that your Experiment file
does NOT contain secrets
section and azure_subscription_id
.
Putting it all together
Here is a full example for an experiment containing secrets and configuration:
{
"version": "1.0.0",
"title": "...",
"description": "...",
"tags": ["azure", "kubernetes", "aks", "node"],
"configuration": {
"azure_subscription_id": "xxx"
},
"secrets": {
"azure": {
"client_id": "xxx",
"client_secret": "xxx",
"tenant_id": "xxx"
}
},
"steady-state-hypothesis": {
"title": "Services are all available and healthy",
"probes": [
{
"type": "probe",
"name": "consumer-service-must-still-respond",
"tolerance": 200,
"provider": {
"type": "http",
"url": "https://some-url/"
}
}
]
},
"method": [
{
"type": "action",
"name": "restart-node-at-random",
"provider": {
"type": "python",
"module": "pdchaosazure.vm.actions",
"func": "restart_machines",
"secrets": ["azure"],
"config": ["azure_subscription_id"]
}
}
],
"rollbacks": []
}
Filter arguments
This extension is making heavy use of the Kusto query language to filter those Azure resources that an experiment is targeting.
The Kusto query language in Azure is a read-only request to process data and return results. The request is stated in plain text, using a data-flow model designed to make the syntax easy to read.
Given that an Azure subscription contains the following Azure resources:
[
{
"name": "machine_1",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
},
{
"name": "machine_2",
"resourceGroup": "my_resource_group",
"type": "Microsoft.Compute/virtualMachines"
},
{
"name": "machine_1",
"resourceGroup": "another_resource_group",
"type": "Microsoft.Compute/virtualMachines"
}
]
With a filter you can ultimatively select the Azure resources that shall be attacked. For example:
where resourceGroup=='my_resource_group''
will select those machines for an attack[ { "name": "machine_1", "resourceGroup": "my_resource_group", "type": "Microsoft.Compute/virtualMachines" }, { "name": "machine_2", "resourceGroup": "my_resource_group", "type": "Microsoft.Compute/virtualMachines" } ]
where name=='machine_1''
will select those machines for an attack[ { "name": "machine_1", "resourceGroup": "my_resource_group", "type": "Microsoft.Compute/virtualMachines" }, { "name": "machine_1", "resourceGroup": "another_resource_group", "type": "Microsoft.Compute/virtualMachines" } ]
where name=='machine_1' and resourceGroup='my_resource_group''
will select[ { "name": "machine_1", "resourceGroup": "my_resource_group", "type": "Microsoft.Compute/virtualMachines" } ]
- If you want to randomly select one machine of your resource group you may do the following operation:
where resourceGroup='my_resource_group'' | sample 1
. Thesample
operator is generating randomness to your selection.[ { "name": "<one of your machines in the 'my_resource_group'>", "resourceGroup": "my_resource_group", "type": "Microsoft.Compute/virtualMachines" } ]
- If you omit the filter entirely one machine out your subscription (if any) is taken.
Kusto Query Language Light
At some places in the chaos experiment API some Azure resources are not supported for filtering with the Kusto Query Language (KQL). A prominent example are instances of a virtual machine scale set.
We decided to support you with an easy way of filtering for those kind of resources with a Kusto Query Language Light (KQLL) syntax. The KQLL defines a small subset of the KQL. Although only a small subset is offered it should serve the daily purposes when used in chaos experiments.
The KQLL defines:
where
-clauses withand
andor
expressions- pipe
|
operators take
,top
, andsample
commands- Equality operators such as
==
,>=
,<=
,>
, and<
- If you omit the KQLL filter one resource of the cluster is selected at random.
- Those queries that provide the KQLL syntax will be marked as such in the activity's documentation.
Contribute
If you wish to contribute more functions to this package, you are more than welcome to do so. Please, fork this project, make your changes following the usual PEP 8 code style complemented with a flavor (defined in .flake8 file), sprinkling with tests and submit a PR for review.
The Proofdock Chaos CLI project requires all contributors to sign a Developer Certificate of Origin on each commit they would like to merge into the master branch of the repository. Please, make sure you can abide by the rules of the DCO before submitting a PR.
Develop
If you wish to develop on this project, make sure to install the development dependencies. But first, create a virtual environment and then install those dependencies.
$ pip install -r requirements-dev.txt -r requirements.txt
Then, point your environment to this directory:
$ python setup.py develop
Now, you can edit the files and they will be automatically be seen by your
environment, even when running from the chaos
command locally.
Test
To run the tests for the project execute the following:
$ pytest
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file proofdock-chaos-azure-1.1.6.tar.gz
.
File metadata
- Download URL: proofdock-chaos-azure-1.1.6.tar.gz
- Upload date:
- Size: 32.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.1 importlib_metadata/4.5.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.61.1 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | cb0de07ef3252c98573344da418b5d5f40ac1f3583d4c9c81cfdfb0206bd30fe |
|
MD5 | 63ab474d547c0b2e956a1b982176609a |
|
BLAKE2b-256 | c1a2879f4d209a5a2138b8c7fdfe0d2388f1386c96743e1f76ceceb172018650 |
File details
Details for the file proofdock_chaos_azure-1.1.6-py3-none-any.whl
.
File metadata
- Download URL: proofdock_chaos_azure-1.1.6-py3-none-any.whl
- Upload date:
- Size: 39.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.4.1 importlib_metadata/4.5.0 pkginfo/1.7.0 requests/2.25.1 requests-toolbelt/0.9.1 tqdm/4.61.1 CPython/3.8.10
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6f6778c3723dacd47c37493cd84cf84d896b9888827971fd1c68d630c0be39f1 |
|
MD5 | 7fffbb80a29c190e581921c32df0aa41 |
|
BLAKE2b-256 | 787d38921d2d7eced433f13b569acab885c710a6bcc68f4eb4d4180bcfb62ade |