Skip to main content
Version: 2.0.7

Simulate JVM Application Faults

JVMChaos introduction

JVMChaos can inject faults into JVM of the target container, which can be applied for any application that uses JVM as the runtime environment. Currently, JVMChaos uses chaosblade-exec-jvm to inject faults into the JVM. JVMChaos supports the following fault types:

  • Specify return value
  • Method Delay
  • Throw custom exceptions
  • Out of memory
  • Fill JVM Code Cache
  • CPU full load in Java
  • Perform customized Groovy or Java script

Usage restrictions

Currently, Chaos Mesh uses MutatingAdmissionWebhook to modify the Pod definition and loads Java agent using Init Containers instead of loading java agent at runtime. Therefore, there are some restrictions when you use JVMChaos:

  • The Webhook support needs to be enabled in Kubernetes.
  • For Pods that exist before you configure MutatingAdmissionWebhook for the namespace, they will not be affected by JVMChaos.
  • JVM in all containers under namespace will load Java agent at the startup stage, and JVMChaos will not unload Java agent after being deleted. If you hope to clean up the Java agent considering the impact that Java agent may have on program behaviors or performance, you can move the workload out of the namespace.

In addition, creating JVMChaos using Chaos Dashboard is not supported currently.

Create experiments using YAML files

The following example shows you the methods and effects of JVMChaos with a specified return value. The YAML files referred in the following steps can be found in examples/jvm. The default work directory for the following steps is in examples/jvm. The default namespace installed by Chaos Mesh is chaos-testing.

1. Create a namespace and configure MutatingAdmissionWebhook

Create the namespace for the application:

kubectl create ns app

Add the admission-webhook=enabled label for the app namespace, and allow the MutatingAdmissionWebhook of Chaos Mesh to modify Pods under the namespace.

kubectl label ns app admission-webhook=enabled

Prepare a template for modifications to be made by JVMChaos:

kubectl apply -f sidecar-template.yaml
kubectl apply -f sidecar.yaml

2. Create target applications

jvm-chaos-demo is a simple Spring Boot application and here serves as a target application. A target application is defined in example/jvm/app.yaml as follows:

apiVersion: apps/v1
kind: Deployment
name: springboot-jvmchaos-demo
namespace: app
replicas: 1
app: springboot-jvmchaos-demo
annotations: jvmchaos-sidecar
creationTimestamp: null
app: springboot-jvmchaos-demo
- image: 'gallardot/chaosmesh-jvmchaos-sample:latest'
imagePullPolicy: IfNotPresent
name: springboot-jvmchaos-demo

In the above example, the annotation with the value jvmchaos-sidecar corresponds to the name of ConfigMap in sidecar.yaml of step 1.

Build application deployment:

kubectl apply -f app.yaml

Execute kubectl -n app get pods, and then you can find 1 Pod with a name like springboot-jvmchaos-demo-777d94c5b9-7t7l2 under the namespace app. Wait for READY changes to 1/1 and then execute the following commands:

kubectl -n app get pods

The result is as follows:

NAME                                        READY   STATUS    RESTARTS   AGE
springboot-jvmchaos-demo-777d94c5b9-7t7l2 1/1 Running 0 21s

3. Obseve application behaviors before injecting faults

You can observe the behavior of the jvm-chaos-demo application before injecting faults, for example:

Map the port of Pod to local using kubectl port-forward:

kubectl -n app port-forward pod/springboot-jvmchaos-demo-777d94c5b9-7t7l2 8080:8080

Use curl in another shell session or directly access to http://localhost:8080/hello. Hello firend is expected to be returned:

curl http://localhost:8080/hello
Hello friend

4. Inject JVMChaos and check

The JVMChaos with a specified return value is as follows:

kind: JVMChaos
name: jvm-return-example
namespace: app
action: return
target: jvm
value: 'hello chaos mesh!'
classname: 'org.chaosmesh.jvm.Application'
methodname: 'hello'
mode: one
app: springboot-jvmchaos-demo

JVMChaos modifies the return value of hello method to string hello chaos mesh!.

Inject JVMChaos with a specified value:

kubectl apply -f ./jvm-return-example.yaml

Use curl or directly access to http://localhost:8080/hello, hello chaos mesh! is expected to be returned:

curl http://localhost:8080/hello
hello chaos mesh!

Field description

ParameterTypeDescriptionDefault valueRequiredExample
actionstringIndicates the specific fault type. The available fault types include return, script, cfl, oom, ccf, tce, tcf, cpf, tde, and tpf.NoneYesreturn
modestringIndicates how to select Pod. The supported modes include one, all, fixed, fixed-percent, and random-max-percent.NoneYesone
valuestringProvides parameters for the mode configuration, depending on mode.NoneNo1
targetstringIndicates the parameter passed to chaosblade-exec-jvm, representing JVMChaos targets, supporting servlet, psql, jvm, jedis, http, dubbo, rocketmq, tars, mysql, ruid, redisson, rabbitmq, monodb.NoneYesjvm
flagsmap[string]stringIndicates parameters passed to chaosblade-exec-jvm and represents the flags of action.NoneNo
matchersmap[string]stringIndicates parameters passed to chaosblade-execu-jvm and represents the matching of injection points.NoneNo

For the meaning of the value of action, refer to:

delaySpecifies method call delay
returnModifies the return value
scriptWrites groovy and Java implement scenarios
cflJava CPU usage overload
oomOut of memory, supporting oom of heap, stack, and metaspaces
ccfJVM code cache fill
tceThrow custom exceptions
cpfConnection pool full
tdeThrow the first exception of method declare
tpfThread pool full

For the details of action, refer to chaos blade document.

For the parameters passed to chaosblade-exec-jvm, Chaos Mesh will merge all fields in flags and matchers as a request body and then send it to chaosblade-exec-jvm. For details, refer to chaosblade-exec-jvm/Protocol.