Skip to content

Chaos Engineering toolset on RabbitMQ

License

Notifications You must be signed in to change notification settings

mashiro-no-rabo/rabbids

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

A toolset for Chaos Engineering on RabbitMQ. Which means it's not built for testing RabbitMQ per say, instead it focuses on helping to verify program and/or system behaviour which depends on RabbitMQ, by simulating various failure scenarios.

The name is inspired by a game series about crazy rabbits.

Some planned functionalities:

  • Trigger alarm state
  • Set queue to blocking / blocked
  • HA queues test (node up/down)
  • Partitioned cluster

Attacks

For now the workflow of performing attacks are very rudimentary, often requires direct (remote) Erlang shell access inside the cluster.

Hopefully this will change in near future.

Memory Attack

The goal can be to trigger high memory alarm (which affects on the whole RabbitMQ cluster) or just examine system behaviour under high memory load.

Setup

  • Connect to one of the nodes in the target RabbitMQ cluster, make sure you're in an environment that it's possible to remote shell to the running Erlang node.
    • Start another node with erl -hidden so it does not disrupt other nodes, see documentation
    • Use -sname or -name depends on how the RabbitMQ node is started, they need to match otherwise they would refuse to cluster
    • Use -setcookie to ensure cookies match
  • Drop the content of rabbids_mem_attack.erl to a good location - i.e. a location that is easy to reference/access in the Erlang shell
    • Use pwd(). to find out the shell's working directory
  • Open a remote shell into the running node (typically Ctrl-G, then r 'rabbit@...' then c)
  • Load the attack module with c("rabbids_mem_attack").
  • Prepare the attack with rabbids_mem_attack:prepare().

Attack

Launch the attack with rabbids_mem_attack:attack(500). The only argument determines the scale of the memory attack in MiB unit, so substitute it with the amount desired.

Use rabbids_mem_attack:info(). to check the running attack.

The attack can be tweaked by further calls to rabbids_mem_attack:attack(...). The new number will replace (not accumulate) the previous attack value.

Withdraw

The attack can be stopped at any time by rabbids_mem_attack:withdraw(). The memory in use should be quickly reclaimed.

Cleanup

It is best to cleanup after everything is done by rabbid_mem_attack:teardown(). This will also release used memory if any attack is running.

Limitations

Currently the attack is limited by one process on the local node. I.e there will only be at most 1 attack running, and it can't be run on other nodes in the cluster.

About

Chaos Engineering toolset on RabbitMQ

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published