Official announcement: Congratulations to ChaosBlade project for entering CNCF Sandbox

Introduction to Alibaba's open source chaos engineering project ChaosBlade passed the CNCF TOC voting and smoothly promoted the CNCF Sandbox. CNCF stands for Cloud Native Computing Foundation (Cloud Native Computing Foundation), which aims to build a sustainable ecosystem for cloud native software and serve vendor-neutral, fast-growing open source projects such as Kubernetes, Prometheus, Envoy, etc.

1.png

Source | Alibaba Cloud Native Public

Alibaba's open source chaos engineering project ChaosBlade passed the CNCF TOC voting and smoothly promoted the CNCF Sandbox. CNCF stands for Cloud Native Computing Foundation (Cloud Native Computing Foundation), which aims to build a sustainable ecosystem for cloud native software and serve vendor-neutral, fast-growing open source projects such as Kubernetes, Prometheus, Envoy, etc.

ChaosBlade github address:
https://github.com/chaosblade-io/chaosblade

Project Introduction

2.png

ChaosBlade is Alibaba's open source chaos engineering project in 2019. It includes chaos engineering experimental tool chaosblade and chaos engineering platform chaosblade-box. It aims to help enterprises solve high-availability problems in the cloud-native process through chaos engineering. The experimental tool chaosblade supports 3 large system platforms, 4 programming language applications, involving more than 200 experimental scenarios and more than 3000 experimental parameters, which can finely control the scope of the experiment. The chaos engineering platform chaosblade-box supports the hosting of experimental tools. In addition to the hosted chaosblade, it also supports Litmuschaos experimental tools. There are more than 40 registered companies, of which the ICBC, China Mobile, Xiaomi, JD.com and other companies have landed and used it.

Core competence

ChaosBlade has the following features:

  • Rich experimental scene : Contains basic resources (CPU, memory, network, disk, process, kernel, files, etc.), multi-language application services (Java, C++, NodeJS, Golang, etc.), Kubernetes platform (covering Container, Pod, etc.) Node resource scenarios, including the above experimental scenarios).
  • Diversified execution methods : In addition to using the platform white screen operation, it can also be executed by the blade tool or kubectl or coding that comes with the tool.
  • Convenient scene expansion capability : All experimental scenes follow the chaos experimental model, and different levels of scenes correspond to different actuators, which are simple to implement and easy to expand.
  • Automated deployment of experimental tools : There is no need to manually deploy experimental tools, and the automatic deployment of experimental tools on the host or cluster is realized.
  • supports open source experiment tool hosting : The platform can host mainstream experiment tools in the industry, such as its own chaosblade and external litmuschaos.
  • Unified Chaos Experiment User Interface : Users do not need to care about the way of using different tools, and perform chaos experiments in the unified user interface.
  • Multi-dimensional experiment method : Supports experiment arrangement from the host to Kubernetes resources, and then to the application dimension.
  • integrated cloud native ecology : adopt Helm deployment management, integrated Prometheus monitoring, support cloud native experiment tool hosting, etc.

Architecture design

The Chaosblade-box architecture is as follows:

3.png

Through the console page, automated deployment of managed tools such as chaosblade, litmuschaos, etc. can be realized. The experiment scene is unified according to the chaos experiment model established by the community, and the target resources are divided according to the host, Kubernetes, and applications. The target resource is controlled by the target manager, and the page is created in the experiment. The target resource selection of white screen can be realized. The platform executes the experimental scenarios of different tools by calling the chaos experiment execution, and with the access to prometheus monitoring, the experimental metric indicators can be observed, and a wealth of experimental reports will be provided later.

The deployment of Chaosblade-box is also very simple. For details, please check: \_ https://github.com/chaosblade-io/chaosblade-box/releases\_ .

future plan

ChaosBlade will be based on cloud native in the future, providing chaos engineering platform and chaos engineering experiment tools for multi-cluster, multi-environment, and multi-language. Experimental tools will continue to focus on the richness and stability of experimental scenes, support more Kubernetes resource scenes and standardized application service experiment scene standards, and provide multi-language experiment scene standard implementations. The chaos engineering platform focuses on simplifying the deployment and implementation of chaos engineering. In the future, it will host more chaos experiment tools and mainstream compatible platforms to implement scene recommendations, provide business and system monitoring integration, output experiment reports, and complete chaos on the basis of ease of use Engineering operation closed loop. Everyone is welcome to join the community to jointly promote the development of the chaotic engineering field, effectively land in the enterprise, and build a highly available distributed system.

Copyright Statement: content of this article is contributed spontaneously by Alibaba Cloud real-name registered users, and the copyright belongs to the original author. The Alibaba Cloud Developer Community does not own its copyright and does not assume corresponding legal responsibilities. For specific rules, please refer to the "Alibaba Cloud Developer Community User Service Agreement" and the "Alibaba Cloud Developer Community Intellectual Property Protection Guidelines". If you find suspected plagiarism in this community, fill in the infringement complaint form to report it. Once verified, the community will immediately delete the suspected infringing content.

阿里巴巴官方技术号,关于阿里巴巴经济体的技术创新、实战经验、技术人的成长心得均呈现于此。

3.1k 声望
6.2k 粉丝
0 条评论
推荐阅读
阿里云:加大NoSQL数据库软硬件一体化技术自研
简介:8月25日,在天池平台与阿里云数据库事业部联合主办的阿里云NoSQL数据库峰会上,阿里云公布NoSQL数据库自研2.0计划,进一步加大软硬件一体化技术体系的自研力度,通过聚焦软硬协同、多模融合、云原生三大方...

阿里云开发者阅读 559

张晋涛:我的 2022 总结
大家好,我是张晋涛。2022 年已经结束,我每年都会惯例的做个小回顾,今年因为阳了在恢复身体,一直拖到了今天才写。生活在 2022 年初做回顾的时候,觉得 2021 是魔幻的一年,但现在看来 2022 年其实更加魔幻。一...

张晋涛6阅读 1k评论 2

封面图
使用kubeasz部署高可用kubernetes集群
本实验采用kubeasz作为kubernetes环境部署工具,它是一个基于二进制方式部署和利用ansible-playbook实现自动化来快速部署高可用kubernetes集群的工具,详细介绍请查看kubeasz官方。本实验用到的所有虚拟机默认软...

李朝阳4阅读 728

Jvm调优与微服务资源分配
在没有接触微服务之前,我们的java程序一般都部署在WebLogic、Tomcat这类应用服务器上,这些应用服务器本身也是基于Jvm虚拟机的。一般我们统一对应用服务器做Jvm参数调优(分配多大内存,线程池限制等),而不用...

KerryWu阅读 5.7k

前端监控稳定性数据分析实践 | 得物技术
1 背景客服一站式工作台集成了在线、热线和工单三个核心应用,支撑着自营客服和 BPO 客服每天处理大量的会话信息,工作台的稳定性就显得非常重要。接入前端监控以来,我们坚持每双周跟进工作台以及客服几个核心应...

得物技术1阅读 726

封面图
不背锅运维:一文搞清楚应用发布到k8s集群的基本流程
❝关于标签的主要作用:标记、过滤、关联(主要体现在deployment、pod、service,3者标签保持一致),可设定多个标签,建议设定至少2个标签,一个为项目标签,一个为应用标签。❞

不背锅运维1阅读 726

TVP专家夜聊:不用ChatGPT的开发都该被炒掉
引言“可能 ChatGPT 已经有智能了,但就像三体里的黑暗森林法则一样,它不会告诉我们。”“GPT-4 冲击最大的是 AI 炼丹师。”“凡是没有自觉用 ChatGPT 的程序员都可以考虑炒掉。”“ChatGPT 带来的工业革命,其实已经在...

腾讯云开发者2阅读 132

封面图

阿里巴巴官方技术号,关于阿里巴巴经济体的技术创新、实战经验、技术人的成长心得均呈现于此。

3.1k 声望
6.2k 粉丝
宣传栏