Kubernetes Chaos Engineering With Chaos Toolkit And Istio
4.7 (21 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
279 students enrolled

Kubernetes Chaos Engineering With Chaos Toolkit And Istio

The DevOps Toolkit Series
4.7 (21 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
279 students enrolled
Last updated 6/2020
English
Current price: $20.99 Original price: $29.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 7 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • The benefits of chaos engineering
  • How to be rewarded for destruction
  • How to test and find limits of a system
  • How to improve a system based on lessons learned from executing chaos experiments
Requirements
  • Kubernetes cluster
  • A few tools installed on a laptop (instructions are provided in the course)
Description

There are very few things as satisfying as destruction, especially true when we're frustrated.

How often did it happen that you have an issue that you cannot solve and that you just want to scream or destroy things? Did you ever have a problem in production that is negatively affecting a lot of users? Were you under a lot of pressure to solve it, but you could not "crack" it as fast as you should. It must have happened, at least once, that you wanted to take a hammer and destroy servers in your datacenter. If something like that never happened to you, then you were probably never in a position under a lot of pressure. In my case, there were countless times when I wanted to destroy things. But I didn't, for quite a few reasons. Destruction rarely solves problems, and it usually leads to negative consequences. I cannot just go and destroy a server and expect that I will not be punished. I cannot hope to be rewarded for such behavior.

What would you say if I tell you that we can be rewarded for destruction and that we can do a lot of good things by destroying stuff? If you don't believe me, you will soon. That's what chaos engineering is about. It is about destroying, obstructing, and delaying things in our servers and in our clusters. And we're doing all that, and many other things, for a very positive outcome.

Chaos engineering tries to find the limits of our system. It helps us deduce what are the consequences when bad things happen. We are trying to simulate the adverse effects in a controlled way. We are trying to do that as a way to improve our systems to make them more resilient and capable of recuperating and resisting harmful and unpredictable events.

That's our mission. We will try to find ways how we can improve our systems based on the knowledge that we will obtain through the chaos.

Who this course is for:
  • Anyone interested in making the applications and the cluster more resilient
Course content
Expand all 93 lectures 07:11:48
+ Introduction
9 lectures 36:12
Principles Of Chaos Engineering
02:05
Are You Ready For Chaos?
04:07
Examples Of Chaos Engineering
02:59
The Principles And The Process
06:06
How Does The Course Work
05:51
Off We Go
04:28
+ Choosing The Right Tool
2 lectures 11:05
Requirements Guiding The Choice
03:23
Which Tool To Pick?
07:42
+ Setting Up The Environment
2 lectures 05:55
Defining Course Requirements
04:12
Installing Chaos Toolkit
01:43
+ Destroying Application Instances
11 lectures 48:12
Introduction
03:12
Gist With Commands
01:19
Creating A Cluster
02:00
Deploying The Application
03:14
Discovering ChaosToolkit Kubernetes Plugin
03:11
Defining Steady State Hypothesis
07:12
Pausing After Actions
03:41
Probing Phases And Conditions
11:19
Making The Application Fault-Tolerant
04:32
Destroying What We Created
01:33
+ Experimenting With Application Availability
9 lectures 33:00
Introduction
01:32
Gist With The Commands
00:44
Creating A Cluster
00:51
Deploying The Application
02:21
Validating The Application
05:31
Validating Application Health
05:53
Validating Application Availability
10:58
Terminating Application Dependencies
04:25
Destroying What We Created
00:45
+ Obstructing And Destroying Network
14 lectures 01:09:43
Introduction
02:33
Gist With The Commands
00:44
Creating A Cluster
00:51
Installing Istio Service Mesh
04:48
Deploying The Application
08:32
Discovering ChaosToolkit Istio Plugin
01:43
Aborting Network Requests
08:27
Rolling Back Abort Failures
07:50
Increasing Network Latency
09:50
Aborting All Requests
04:35
Simulating Denial Of Service Attacks
07:37
Running Denial Of Service Attacks
06:04
Destroying What We Created
00:45
+ Draining And Deleting Nodes
10 lectures 46:27
Introduction
01:16
Gist With The Commands
00:44
Creating A Cluster
03:42
Deploying The Application
02:08
Draining Worker Nodes
10:53
Uncordoning Worker Nodes
04:21
Making Nodes Drainable
09:31
Deleting Worker Nodes
08:37
Destroying Cluster Zones
03:55
Destroying What We Created
01:20
+ Creating Chaos Experiment Reports
8 lectures 28:35
Introduction
02:29
Gist With The Commands
00:44
Creating A Cluster
02:02
Deploying The Application
02:36
Exploring Experiments Journal
07:01
Creating Experiment Report
07:43
Creating A Multi-Experiment Report
04:10
Destroying What We Created
01:50
+ Running Chaos Experiments Inside A Kubernetes Cluster
12 lectures 01:08:03
Introduction
01:43
Gist With The Commands
00:44
Creating A Cluster
00:51
Deploying The Application
03:13
Setting Up Chaos Toolkit In Kubernetes
08:13
Types Of Experiment Executions
01:25
Running One-Shot Experiments
11:14
Running Failed Scheduled Experiments
06:21
Sending Experiment Notifications
11:24
Sending Selective Notifications
11:21
Destroying What We Created
01:15
+ Executing Random Chaos
14 lectures 01:12:12
Introduction
02:41
Gist with the commands
00:44
Creating A Cluster
00:51
Deploying The Application
03:13
Deploying Dashboard Applications
07:54
Exploring Grafana Dashboards
05:03
Exploring Kiali Dashboards
07:55
Preparing For Termination Of Instances
08:44
Terminating Random Application Instances
13:15
Disrupting Network Traffic
03:25
Preparing For Termination Of Nodes
06:58
Terminating Random Nodes
06:29
Monitoring And Alerting With Prometheus
03:07
Destroying What We Created
01:53