{% set file = file or '/etc/yardstick/pod.yaml' %}
{% set attack_host = attack_host or "node1" %}
+{% set attack_process = attack_process or "nova-api" %}
scenarios:
-
options:
attackers:
- fault_type: "kill-process"
- process_name: "nova-api"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
wait_time: 10
sla:
max_outage_time: 5
- monitor_type: "process"
- process_name: "nova-api"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
monitor_number: 3
{% set file = file or '/etc/yardstick/pod.yaml' %}
{% set attack_host = attack_host or "node1" %}
+{% set attack_process = attack_process or "neutron-server" %}
scenarios:
-
options:
attackers:
- fault_type: "kill-process"
- process_name: "neutron-server"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitors:
sla:
max_outage_time: 5
- monitor_type: "process"
- process_name: "neutron-server"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
monitor_number: 3
{% set file = file or '/etc/yardstick/pod.yaml' %}
{% set attack_host = attack_host or "node1" %}
+{% set attack_process = attack_process or "keystone" %}
scenarios:
-
options:
attackers:
- fault_type: "kill-process"
- process_name: "keystone"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitors:
sla:
max_outage_time: 5
- monitor_type: "process"
- process_name: "keystone"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
monitor_number: 3
{% set file = file or '/etc/yardstick/pod.yaml' %}
{% set attack_host = attack_host or "node1" %}
+{% set attack_process = attack_process or "glance-api" %}
scenarios:
-
options:
attackers:
- fault_type: "kill-process"
- process_name: "glance-api"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitors:
sla:
max_outage_time: 5
- monitor_type: "process"
- process_name: "glance-api"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
monitor_number: 3
{% set file = file or '/etc/yardstick/pod.yaml' %}
{% set attack_host = attack_host or "node1" %}
+{% set attack_process = attack_process or "cinder-api" %}
scenarios:
-
options:
attackers:
- fault_type: "kill-process"
- process_name: "cinder-api"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitors:
sla:
max_outage_time: 5
- monitor_type: "process"
- process_name: "cinder-api"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
monitor_number: 3
{% set file = file or '/etc/yardstick/pod.yaml' %}
{% set attack_host = attack_host or "node1" %}
+{% set attack_process = attack_process or "swift-proxy" %}
scenarios:
-
options:
attackers:
- fault_type: "kill-process"
- process_name: "swift-proxy"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitors:
sla:
max_outage_time: 5
- monitor_type: "process"
- process_name: "swift-proxy"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
monitor_number: 3
{% set file = file or '/etc/yardstick/pod.yaml' %}
{% set attack_host = attack_host or "node1" %}
+{% set attack_process = attack_process or "haproxy" %}
scenarios:
-
fault_type: "kill-process"
host: {{attack_host}}
key: "kill-process"
- process_name: "haproxy"
+ process_name: "{{ attack_process }}"
monitors:
-
monitor_type: "process"
key: "service-status"
- process_name: "haproxy"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
monitor_number: 3
{% set attack_host = attack_host or 'node1' %}
{% set monitor_time = monitor_time or 10 %}
{% set monitor_number = monitor_number or 3 %}
+{% set attack_process = attack_process or "rabbitmq-server" %}
scenarios:
-
options:
attackers:
- fault_type: "kill-process"
- process_name: "rabbitmq-server"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitors:
max_outage_time: 5
- monitor_type: "process"
- process_name: "rabbitmq-server"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
monitor_time: 30
sla:
{% set check_host = check_host or 'node2' %}
{% set monitor_time = monitor_time or 10 %}
{% set monitor_number = monitor_number or 3 %}
+{% set attack_process = attack_process or "corosync" %}
scenarios:
-
key: "kill-process"
attack_key: "kill-corosync"
action_parameter:
- process_name: "corosync"
+ process_name: "{{ attack_process }}"
monitors:
-
{% set image = image or 'yardstick-image' %}
{% set flavor = flavor or 'yardstick-flavor' %}
{% set attack_host = attack_host or 'node1' %}
+{% set attack_process = attack_process or "neutron-l3-agent" %}
scenarios:
-
fault_type: "kill-process"
host: {{attack_host}}
key: "kill-process"
- process_name: "neutron-l3-agent"
+ process_name: "{{ attack_process }}"
monitors:
-
monitor_type: "process"
- process_name: "neutron-l3-agent"
+ process_name: "{{ attack_process }}"
host: {{attack_host}}
key: "monitor-recovery"
monitor_time: 30
kill -9 "${pid}"
done
else
- for pid in $(pgrep -f "/usr/.*/${process_name}");
+ for pid in $(pgrep -fa [^-_a-zA-Z0-9]${process_name} | grep -iv heartbeat | awk '{print $1}');
do
kill -9 "${pid}"
done