-
Notifications
You must be signed in to change notification settings - Fork 694
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Network-loss tests do not work with minikube #979
Comments
Deployment: apiVersion: apps/v1
kind: Deployment
metadata:
creationTimestamp: null
labels:
app: busy1
name: busy1
spec:
replicas: 1
selector:
matchLabels:
app: busy1
strategy: {}
template:
metadata:
creationTimestamp: null
labels:
app: busy1
spec:
containers:
- image: debian
name: busy-1
command: [ "/bin/bash", "-c", "sleep 10000;exit 0" ] ChaosEngine apiVersion: litmuschaos.io/v1alpha1
kind: ChaosEngine
metadata:
name: engine
namespace: default
spec:
jobCleanUpPolicy: delete
monitoring: false
appinfo:
# app namespace
appns: default
# to see app label, apply kubectl get pods --show-labels
applabel: 'app=busy1'
# supported kinds: deployment, statefulset
appkind: deployment
chaosServiceAccount: 'nginx'
experiments:
- name: pod-network-loss
spec:
components:
- name: TARGET_CONTAINER
value: 'busy-1'
- name: NETWORK_INTERFACE
value: 'eth0' |
I opened an issue in the pumba repo, there it is also explained in detail what was tested yet. The pumba netem itself runs successfully on my laptop with docker 19. |
I have a small achievement: someone having the same problem in a pumba chat said that minikube might be missing the needed kernel module |
I will try experimenting with running containers in privileged mode on Monday, let's see what this gives me. It seems the kernel module is there but the container does not have the privileges to execute the |
I now ran the container with
and get Running the container in privileged mode changed nothing for pumba, it still does not work. |
Okay, I kept searching. Edit: I can run a |
Maybe the netem kernel module is really missing. |
I need to test it a bit further as it only works with priviledged containers, but for now my PR should fix the issue. |
Minikube got patched with the missing kernel module, use version >= 1.6.0, released on 2019-12-10. The PR #991 from @ksatchit also has the effect that containers don't have to be privileged in order for netem to work, as netem is now executed on a seperate container. As far as I tested it, minikube now has no further limitations in netem related experiments, so this issue can be closed. |
What happened:
Running a pod network loss experiment (and in all probability the network-delay test) on minikube is not seen to inject the desired chaos. Thanks to @LaumiH for discovering this.
This was observed with the following versions:
The test involved setting up a ping to general/public IPs from inside the pod & also setting up a ping to the pod IP itself from a cluster node.
What you expected to happen:
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know?:
The text was updated successfully, but these errors were encountered: