All Projects → vmware-tanzu → Sonobuoy

vmware-tanzu / Sonobuoy

Licence: apache-2.0
Sonobuoy is a diagnostic tool that makes it easier to understand the state of a Kubernetes cluster by running a set of Kubernetes conformance tests and other plugins in an accessible and non-destructive manner.

Programming Languages

go
31211 projects - #10 most used programming language
SCSS
7915 projects
HTML
75241 projects
shell
77523 projects

Projects that are alternatives of or similar to Sonobuoy

Metalk8s
An opinionated Kubernetes distribution with a focus on long-term on-prem deployments
Stars: ✭ 217 (-91.11%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment, kubernetes-setup
Eksctl
The official CLI for Amazon EKS
Stars: ✭ 3,550 (+45.37%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment, kubernetes-setup
kubernetes the easy way
Automating Kubernetes the hard way with Vagrant and scripts
Stars: ✭ 22 (-99.1%)
Mutual labels:  cncf, kubernetes-cluster, kubernetes-setup
Kubernix
Single dependency Kubernetes clusters for local testing, experimenting and development
Stars: ✭ 545 (-77.68%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment, kubernetes-setup
GPU-Kubernetes-Guide
How to setup a production-grade Kubernetes GPU cluster on Paperspace in 10 minutes for $10
Stars: ✭ 34 (-98.61%)
Mutual labels:  kubernetes-cluster, kubernetes-setup, kubernetes-deployment
Kubernetes Under The Hood
This tutorial is someone planning to install a Kubernetes cluster and wants to understand how everything fits together.
Stars: ✭ 279 (-88.57%)
Mutual labels:  kubernetes-cluster, kubernetes-setup
Kube Cluster Osx
Local development multi node Kubernetes Cluster for macOS made very simple
Stars: ✭ 294 (-87.96%)
Mutual labels:  kubernetes-cluster, kubernetes-setup
Kubernetes Workshop
⚙️ A Gentle introduction to Kubernetes with more than just the basics. 🌟 Give it a star if you like it.
Stars: ✭ 3,122 (+27.85%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment
Rak8s
Stand up a Raspberry Pi based Kubernetes cluster with Ansible
Stars: ✭ 354 (-85.5%)
Mutual labels:  kubernetes-cluster, kubernetes-setup
Kubernetes Tutorial
Running Kubernetes cluster Locally tutorial
Stars: ✭ 257 (-89.48%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment
Kubekit
A Kubernetes deployment toolkit for offline environment.
Stars: ✭ 328 (-86.57%)
Mutual labels:  kubernetes-deployment, kubernetes-setup
Kubernetes Gpu Guide
This guide should help fellow researchers and hobbyists to easily automate and accelerate there deep leaning training with their own Kubernetes GPU cluster.
Stars: ✭ 740 (-69.7%)
Mutual labels:  kubernetes-cluster, kubernetes-setup
Kubernetes Certified Administrator
Online resources that will help you prepare for taking the CNCF CKA 2020 "Kubernetes Certified Administrator" Certification exam. with time, This is not likely the comprehensive up to date list - please make a pull request if there something that should be added here.
Stars: ✭ 3,438 (+40.79%)
Mutual labels:  cncf, kubernetes-cluster
Kubekey
Provides a flexible, rapid and convenient way to install Kubernetes only, both Kubernetes and KubeSphere, and related cloud-native add-ons. It is also an efficient tool to scale and upgrade your cluster.
Stars: ✭ 288 (-88.21%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment
K8s Kotlin Dsl
Kotlin DSL for Kubernetes configs
Stars: ✭ 259 (-89.39%)
Mutual labels:  kubernetes-deployment, kubernetes-setup
Hkube
Kubernetes cluster deployment to Hetzner Cloud
Stars: ✭ 55 (-97.75%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment
Raspbernetes
Raspberry Pi Kubernetes Cluster
Stars: ✭ 53 (-97.83%)
Mutual labels:  kubernetes-cluster, kubernetes-setup
Kubernaut
Instant ephemeral Kubernetes clusters for development and testing
Stars: ✭ 115 (-95.29%)
Mutual labels:  kubernetes-deployment, kubernetes-setup
Ops Cli
Ops - cli wrapper for Terraform, Ansible, Helmfile and SSH for cloud automation
Stars: ✭ 152 (-93.78%)
Mutual labels:  kubernetes-cluster, kubernetes-deployment
k8s-install.sh
k8s国内安装脚本: 不整那么复杂, 复制-粘贴-敲回车就好了.
Stars: ✭ 16 (-99.34%)
Mutual labels:  kubernetes-cluster, kubernetes-setup

Sonobuoy Logo

Test Lint

Overview

Sonobuoy is a diagnostic tool that makes it easier to understand the state of a Kubernetes cluster by running a set of plugins (including Kubernetes conformance tests) in an accessible and non-destructive manner. It is a customizable, extendable, and cluster-agnostic way to generate clear, informative reports about your cluster.

Its selective data dumps of Kubernetes resource objects and cluster nodes allow for the following use cases:

  • Integrated end-to-end (e2e) conformance-testing
  • Workload debugging
  • Custom data collection via extensible plugins

Starting v0.20, Sonobuoy supports Kubernetes v1.17 or later. Sonobuoy releases will be independent of Kubernetes release, while ensuring that new releases continue to work functionally across different versions of Kubernetes. Read more about the new release cycles in our blog.

Note: You can skip this version enforcement by running Sonobuoy with the --skip-preflight flag.

Prerequisites

Installation

  1. Download the latest release for your client platform.

  2. Extract the tarball:

    tar -xvf <RELEASE_TARBALL_NAME>.tar.gz
    

    Move the extracted sonobuoy executable to somewhere on your PATH.

Getting Started

To launch conformance tests (ensuring CNCF conformance) and wait until they are finished run:

sonobuoy run --wait

Note: Using --mode quick will significantly shorten the runtime of Sonobuoy. It runs just a single test, helping to quickly validate your Sonobuoy and Kubernetes configuration.

Get the results from the plugins (e.g. e2e test results):

results=$(sonobuoy retrieve)

Inspect results for test failures. This will list the number of tests failed and their names:

sonobuoy results $results

Note: The results command has lots of useful options for various situations. See the results page for more details.

You can also extract the entire contents of the file to get much more detailed data about your cluster.

Sonobuoy creates a few resources in order to run and expects to run within its own namespace.

Deleting Sonobuoy entails removing its namespace as well as a few cluster scoped resources.

sonobuoy delete --wait

Note: The --wait option ensures the Kubernetes namespace is deleted, avoiding conflicts if another Sonobuoy run is started quickly.

Other Tests

By default, sonobuoy run runs the Kubernetes conformance tests but this can easily be configured. The same plugin that has the conformance tests has all the Kubernetes end-to-end tests which include other tests such as:

  • tests for specific storage features
  • performance tests
  • scaling tests
  • provider specific tests
  • and many more

To modify which tests you want to run, checkout our page on the e2e plugin.

If you want to run other tests or tools which are not a part of the Kubernetes end-to-end suite, refer to our documentation on custom plugins.

Monitoring Sonobuoy during a run

You can check on the status of each of the plugins running with:

sonobuoy status

You can also inspect the logs of all Sonobuoy containers:

sonobuoy logs

Troubleshooting

If you encounter any problems that the documentation does not address, file an issue.

Docker Hub rate limit

This year, Docker has started rate limiting image pulls from Docker Hub. We're planning a future release with a better user interface to work around this. Until then, this is the recommended approach.

Sonobuoy Pod

Sonobuoy by default pulls from Docker Hub for sonobuoy/sonobuoy image. If you're encountering rate limit on this, you can use VMware-provided mirror with:

sonobuoy run --sonobuoy-image projects.registry.vmware.com/sonobuoy/sonobuoy:<VERSION>

Conformance

Kubernetes end-to-end conformance test pulls several images from Docker Hub as part of testing. To override this, you will need to create a registry manifest file locally (e.g. conformance-image-config.yaml) containing the following:

dockerLibraryRegistry: mirror.gcr.io/library

Then on running conformance:

sonobuoy run --sonobuoy-image projects.registry.vmware.com/sonobuoy/sonobuoy:<VERSION> --e2e-repo-config conformance-image-config.yaml

Technically dockerGluster is also a registry pulling from Docker Hub, but it's not part of Conformance test suite at the moment, so overriding dockerLibraryRegistry should be enough.

Known Issues

Leaked End-to-end namespaces

There are some Kubernetes e2e tests that may leak resources. Sonobuoy can help clean those up as well by deleting all namespaces prefixed with e2e:

sonobuoy delete --all

Run on Google Cloud Platform (GCP)

Sonobuoy requires admin permissions which won't be automatic if you are running via Google Kubernetes Engine (GKE) cluster. You must first create an admin role for the user under which you run Sonobuoy:

kubectl create clusterrolebinding <your-user-cluster-admin-binding> --clusterrole=cluster-admin --user=<[email protected]>

Run on Kubernetes for Docker Desktop

We don't recommend running via a cluster set up via Docker Desktop. Known issues include:

  • kubectl logs will not function
  • sonobuoy logs will not function
  • sonobuoy retrieve will not function
  • systemd-logs plugin will hang

Most of these issues revolve around issues with kube-proxy on Docker Desktop so if you know of how to resolve these issues, let us know.

Certified-Conformance bug (versions v0.53.0 and v0.53.1)

These versions of Sonobuoy have a bug that runs the wrong set of tests without additional actions. See more details here. The simplest way to avoid this is to update your version of Sonobuoy to >= v0.53.2.

Contributing

Thanks for taking the time to join our community and start contributing! We welcome pull requests. Feel free to dig through the issues and jump in.

Before you start

  • Please familiarize yourself with the Code of Conduct before contributing.
  • See CONTRIBUTING.md for instructions on the developer certificate of origin that we require.
  • There is a Slack channel if you want to interact with other members of the community

Changelog

See the list of releases to find out about feature changes.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].