Skip to content

Commit 5510bc9

Browse files
authored
Adding docs for 2.7.0 release (#174)
* Updated docs for 2.7.0 release Signed-off-by: Jonsy13 <[email protected]> * Updated docs for 2.7.0 release Signed-off-by: Jonsy13 <[email protected]> * Added probes updates Signed-off-by: Jonsy13 <[email protected]> * Added probes updates Signed-off-by: Jonsy13 <[email protected]>
1 parent ece4adc commit 5510bc9

File tree

286 files changed

+10513
-47
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

286 files changed

+10513
-47
lines changed

website/docs/concepts/probes.md

Lines changed: 34 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The `httpProbe` is better used in the Continuous mode of operation as a parallel
8787

8888
The `cmdProbe` allows developers to run shell commands and match the resulting output as part of the entry/exit criteria. The intent behind this probe was to allow users to implement a non-standard & imperative way for expressing their hypothesis. For example, the cmdProbe enables you to check for specific data within a database, parse the value out of a JSON blob being dumped into a certain path or check for the existence of a particular string in the service logs.
8989

90-
In order to enable this behaviour, the probe supports an inline mode in which the command is run from within the experiment image as well as a source mode, where the command execution is carried out from within a new pod whose image can be specified. While inline is preferred for simple shell commands , source mode can be used when application-specific binaries are required. The cmdProbe can be defined at `.spec.experiments[].spec.probe` the path inside the ChaosEngine.
90+
In order to enable this behaviour, the probe supports an inline mode in which the command is run from within the experiment image as well as a source mode, where the command execution is carried out from within a new pod whose image can be specified. While inline is preferred for simple shell commands, source mode can be used when application-specific binaries are required. The cmdProbe can be defined at `.spec.experiments[].spec.probe` the path inside the ChaosEngine.
9191

9292
```yaml
9393
probe:
@@ -99,7 +99,9 @@ probe:
9999
type: 'string' # supports: string, int, float
100100
criteria: 'contains' #supports >=,<=,>,<,==,!= for int and contains,equal,notEqual,matches,notMatches for string values
101101
value: '<value-for-criteria-match>'
102-
source: '<repo>/<tag>' # it can be “inline” or any image
102+
source: # omit this tag to "inline" the probe
103+
image: '<repo>/<tag>'
104+
hostNetwork: false
103105
mode: 'Edge'
104106
runProperties:
105107
probeTimeout: 5
@@ -108,6 +110,8 @@ probe:
108110
initialDelaySeconds: 5
109111
```
110112

113+
> `source.hostNetwork` can be set to `true` to allow access to the node network namespace for the pod executing the probe
114+
111115
### k8sProbe
112116

113117
With the proliferation of custom resources & operators, especially in the case of stateful applications, the steady-state is manifested as status parameters/flags within Kubernetes resources. k8sProbe addresses verification of the desired resource state by allowing users to define the Kubernetes GVR (group-version-resource) with appropriate filters (field selectors/label selectors). The experiment makes use of the Kubernetes Dynamic Client to achieve this.The `k8sProbe` can be defined at `.spec.experiments[].spec.probe` the path inside ChaosEngine.
@@ -554,23 +558,46 @@ This section describes the different fields of the litmus probes and the possibl
554558
<table>
555559
<tr>
556560
<th>Field</th>
557-
<td><code>.cmdProbe/inputs.source</code></td>
561+
<td><code>.cmdProbe/inputs.source.image</code></td>
558562
</tr>
559563
<tr>
560564
<th>Description</th>
561-
<td>Flag to hold the source for the cmdProbe</td>
565+
<td>Flag to hold the image for the cmdProbe</td>
562566
</tr>
563567
<tr>
564568
<th>Type</th>
565-
<td>Mandatory</td>
569+
<td>Optional</td>
570+
</tr>
571+
<tr>
572+
<th>Range</th>
573+
<td><code>any source docker image</code></td>
574+
</tr>
575+
<tr>
576+
<th>Notes</th>
577+
<td>The <code>.cmdProbe/inputs.source.image</code> provides the source image which can be used to launch a external pod where the command execution is carried out.</td>
578+
</tr>
579+
</table>
580+
581+
<table>
582+
<tr>
583+
<th>Field</th>
584+
<td><code>.cmdProbe/inputs.source.hostNetwork</code></td>
585+
</tr>
586+
<tr>
587+
<th>Description</th>
588+
<td>Flag to allow or deny the <code>.cmdProbe/inputs.source.image</code> access to the node network namespace</td>
589+
</tr>
590+
<tr>
591+
<th>Type</th>
592+
<td>Optional</td>
566593
</tr>
567594
<tr>
568595
<th>Range</th>
569-
<td> <code>inline</code>, <code>any source docker image</code></td>
596+
<td><code>true</code>, <code>false</code></td>
570597
</tr>
571598
<tr>
572599
<th>Notes</th>
573-
<td>The <code>.cmdProbe/inputs.source</code> It supports <code>inline</code> value when command can be run from within the experiment image. Otherwise provide the source image which can be used to launch a external pod where the command execution is carried out.</td>
600+
<td>The <code>.cmdProbe/inputs.source.hostNetwork</code> provides a possibility to allow the pod executing the cmdProbe access to the network of the node he is running on. For more details <a href="https://kubernetes.io/docs/concepts/policy/pod-security-policy/#host-namespaces" target="_blank">refer to the offical Kubernetes documentation</a>.</td>
574601
</tr>
575602
</table>
576603

website/package-lock.json

Lines changed: 11 additions & 9 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

website/versioned_docs/version-2.3.0/concepts/probes.md

Lines changed: 34 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The `httpProbe` is better used in the Continuous mode of operation as a parallel
8787

8888
The `cmdProbe` allows developers to run shell commands and match the resulting output as part of the entry/exit criteria. The intent behind this probe was to allow users to implement a non-standard & imperative way for expressing their hypothesis. For example, the cmdProbe enables you to check for specific data within a database, parse the value out of a JSON blob being dumped into a certain path or check for the existence of a particular string in the service logs.
8989

90-
In order to enable this behaviour, the probe supports an inline mode in which the command is run from within the experiment image as well as a source mode, where the command execution is carried out from within a new pod whose image can be specified. While inline is preferred for simple shell commands , source mode can be used when application-specific binaries are required. The cmdProbe can be defined at `.spec.experiments[].spec.probe` the path inside the ChaosEngine.
90+
In order to enable this behaviour, the probe supports an inline mode in which the command is run from within the experiment image as well as a source mode, where the command execution is carried out from within a new pod whose image can be specified. While inline is preferred for simple shell commands, source mode can be used when application-specific binaries are required. The cmdProbe can be defined at `.spec.experiments[].spec.probe` the path inside the ChaosEngine.
9191

9292
```yaml
9393
probe:
@@ -99,7 +99,9 @@ probe:
9999
type: 'string' # supports: string, int, float
100100
criteria: 'contains' #supports >=,<=,>,<,==,!= for int and contains,equal,notEqual,matches,notMatches for string values
101101
value: '<value-for-criteria-match>'
102-
source: '<repo>/<tag>' # it can be “inline” or any image
102+
source: # omit this tag to "inline" the probe
103+
image: '<repo>/<tag>'
104+
hostNetwork: false
103105
mode: 'Edge'
104106
runProperties:
105107
probeTimeout: 5
@@ -108,6 +110,8 @@ probe:
108110
initialDelaySeconds: 5
109111
```
110112

113+
> `source.hostNetwork` can be set to `true` to allow access to the node network namespace for the pod executing the probe
114+
111115
### k8sProbe
112116

113117
With the proliferation of custom resources & operators, especially in the case of stateful applications, the steady-state is manifested as status parameters/flags within Kubernetes resources. k8sProbe addresses verification of the desired resource state by allowing users to define the Kubernetes GVR (group-version-resource) with appropriate filters (field selectors/label selectors). The experiment makes use of the Kubernetes Dynamic Client to achieve this.The `k8sProbe` can be defined at `.spec.experiments[].spec.probe` the path inside ChaosEngine.
@@ -554,23 +558,46 @@ This section describes the different fields of the litmus probes and the possibl
554558
<table>
555559
<tr>
556560
<th>Field</th>
557-
<td><code>.cmdProbe/inputs.source</code></td>
561+
<td><code>.cmdProbe/inputs.source.image</code></td>
558562
</tr>
559563
<tr>
560564
<th>Description</th>
561-
<td>Flag to hold the source for the cmdProbe</td>
565+
<td>Flag to hold the image for the cmdProbe</td>
562566
</tr>
563567
<tr>
564568
<th>Type</th>
565-
<td>Mandatory</td>
569+
<td>Optional</td>
570+
</tr>
571+
<tr>
572+
<th>Range</th>
573+
<td><code>any source docker image</code></td>
574+
</tr>
575+
<tr>
576+
<th>Notes</th>
577+
<td>The <code>.cmdProbe/inputs.source.image</code> provides the source image which can be used to launch a external pod where the command execution is carried out.</td>
578+
</tr>
579+
</table>
580+
581+
<table>
582+
<tr>
583+
<th>Field</th>
584+
<td><code>.cmdProbe/inputs.source.hostNetwork</code></td>
585+
</tr>
586+
<tr>
587+
<th>Description</th>
588+
<td>Flag to allow or deny the <code>.cmdProbe/inputs.source.image</code> access to the node network namespace</td>
589+
</tr>
590+
<tr>
591+
<th>Type</th>
592+
<td>Optional</td>
566593
</tr>
567594
<tr>
568595
<th>Range</th>
569-
<td> <code>inline</code>, <code>any source docker image</code></td>
596+
<td><code>true</code>, <code>false</code></td>
570597
</tr>
571598
<tr>
572599
<th>Notes</th>
573-
<td>The <code>.cmdProbe/inputs.source</code> It supports <code>inline</code> value when command can be run from within the experiment image. Otherwise provide the source image which can be used to launch a external pod where the command execution is carried out.</td>
600+
<td>The <code>.cmdProbe/inputs.source.hostNetwork</code> provides a possibility to allow the pod executing the cmdProbe access to the network of the node he is running on. For more details <a href="https://kubernetes.io/docs/concepts/policy/pod-security-policy/#host-namespaces" target="_blank">refer to the offical Kubernetes documentation</a>.</td>
574601
</tr>
575602
</table>
576603

website/versioned_docs/version-2.4.0/concepts/probes.md

Lines changed: 35 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The `httpProbe` is better used in the Continuous mode of operation as a parallel
8787

8888
The `cmdProbe` allows developers to run shell commands and match the resulting output as part of the entry/exit criteria. The intent behind this probe was to allow users to implement a non-standard & imperative way for expressing their hypothesis. For example, the cmdProbe enables you to check for specific data within a database, parse the value out of a JSON blob being dumped into a certain path or check for the existence of a particular string in the service logs.
8989

90-
In order to enable this behaviour, the probe supports an inline mode in which the command is run from within the experiment image as well as a source mode, where the command execution is carried out from within a new pod whose image can be specified. While inline is preferred for simple shell commands , source mode can be used when application-specific binaries are required. The cmdProbe can be defined at `.spec.experiments[].spec.probe` the path inside the ChaosEngine.
90+
In order to enable this behaviour, the probe supports an inline mode in which the command is run from within the experiment image as well as a source mode, where the command execution is carried out from within a new pod whose image can be specified. While inline is preferred for simple shell commands, source mode can be used when application-specific binaries are required. The cmdProbe can be defined at `.spec.experiments[].spec.probe` the path inside the ChaosEngine.
9191

9292
```yaml
9393
probe:
@@ -99,7 +99,9 @@ probe:
9999
type: 'string' # supports: string, int, float
100100
criteria: 'contains' #supports >=,<=,>,<,==,!= for int and contains,equal,notEqual,matches,notMatches for string values
101101
value: '<value-for-criteria-match>'
102-
source: '<repo>/<tag>' # it can be “inline” or any image
102+
source: # omit this tag to "inline" the probe
103+
image: '<repo>/<tag>'
104+
hostNetwork: false
103105
mode: 'Edge'
104106
runProperties:
105107
probeTimeout: 5
@@ -108,6 +110,8 @@ probe:
108110
initialDelaySeconds: 5
109111
```
110112

113+
> `source.hostNetwork` can be set to `true` to allow access to the node network namespace for the pod executing the probe
114+
111115
### k8sProbe
112116

113117
With the proliferation of custom resources & operators, especially in the case of stateful applications, the steady-state is manifested as status parameters/flags within Kubernetes resources. k8sProbe addresses verification of the desired resource state by allowing users to define the Kubernetes GVR (group-version-resource) with appropriate filters (field selectors/label selectors). The experiment makes use of the Kubernetes Dynamic Client to achieve this.The `k8sProbe` can be defined at `.spec.experiments[].spec.probe` the path inside ChaosEngine.
@@ -554,23 +558,46 @@ This section describes the different fields of the litmus probes and the possibl
554558
<table>
555559
<tr>
556560
<th>Field</th>
557-
<td><code>.cmdProbe/inputs.source</code></td>
561+
<td><code>.cmdProbe/inputs.source.image</code></td>
558562
</tr>
559563
<tr>
560564
<th>Description</th>
561-
<td>Flag to hold the source for the cmdProbe</td>
565+
<td>Flag to hold the image for the cmdProbe</td>
562566
</tr>
563567
<tr>
564568
<th>Type</th>
565-
<td>Mandatory</td>
569+
<td>Optional</td>
570+
</tr>
571+
<tr>
572+
<th>Range</th>
573+
<td><code>any source docker image</code></td>
574+
</tr>
575+
<tr>
576+
<th>Notes</th>
577+
<td>The <code>.cmdProbe/inputs.source.image</code> provides the source image which can be used to launch a external pod where the command execution is carried out.</td>
578+
</tr>
579+
</table>
580+
581+
<table>
582+
<tr>
583+
<th>Field</th>
584+
<td><code>.cmdProbe/inputs.source.hostNetwork</code></td>
585+
</tr>
586+
<tr>
587+
<th>Description</th>
588+
<td>Flag to allow or deny the <code>.cmdProbe/inputs.source.image</code> access to the node network namespace</td>
589+
</tr>
590+
<tr>
591+
<th>Type</th>
592+
<td>Optional</td>
566593
</tr>
567594
<tr>
568595
<th>Range</th>
569-
<td> <code>inline</code>, <code>any source docker image</code></td>
596+
<td><code>true</code>, <code>false</code></td>
570597
</tr>
571598
<tr>
572599
<th>Notes</th>
573-
<td>The <code>.cmdProbe/inputs.source</code> It supports <code>inline</code> value when command can be run from within the experiment image. Otherwise provide the source image which can be used to launch a external pod where the command execution is carried out.</td>
600+
<td>The <code>.cmdProbe/inputs.source.hostNetwork</code> provides a possibility to allow the pod executing the cmdProbe access to the network of the node he is running on. For more details <a href="https://kubernetes.io/docs/concepts/policy/pod-security-policy/#host-namespaces" target="_blank">refer to the offical Kubernetes documentation</a>.</td>
574601
</tr>
575602
</table>
576603

@@ -1103,4 +1130,4 @@ Probes can be Chained, Probe chaining enables reuse of probe, the order of execu
11031130
## Learn more
11041131

11051132
- [Explore the ChaosResult Custom Resource](chaos-result.md)
1106-
- [Explore the ChaosEngine Custom Resource](chaos-engine.md)
1133+
- [Explore the ChaosEngine Custom Resource](chaos-engine.md)

0 commit comments

Comments
 (0)