-
Notifications
You must be signed in to change notification settings - Fork 632
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ChaosBlade incubation proposal #1278
Conversation
Signed-off-by: caimingxia <mingshao.cmx@alibaba-inc.com>
ChaosBlade是国内混沌工程领域的很优秀的工具,一个深度使用者的强烈推荐 |
chaosblade支持多个场景的故障注入,便于开发、维护和扩展 ,chaosblade老炮推荐 |
chaosblade 开源越来越棒! |
ChaosBlade has developed very well in the field of cloud-native chaos engineering with rich functions. It looks forward to entering cncf incubation |
ChaosBlade is an open-source chaos engineering platform. It provides a comprehensive set of tools and frameworks to help developers and operations teams inject faults, monitor, analyze, and recover in distributed systems, ultimately enhancing system resilience and stability. |
chaosblade can perfectly applyed to kubernet or physical injection,and with the chaosblade-box,we can easily do any experiments , very good! |
The ChaosBlade tool contains chaos experiments in many fields. Chaos experiments in different fields are implemented by different projects. gogoooooooo🚀 |
Hi @angellk, The project has presented the latest update with |
Hi Karena,
Confirming Huxing and the ChaosBlade team presented at the APAC TAG
Observability meeting today with a overview of the project, its technical
features, adoption and contributor ecosystem.
Let me know if you have any questions.
Best,
Alolita
…On Tue, Jul 9, 2024 at 9:22 PM Huxing Zhang ***@***.***> wrote:
Hi @angellk <https://github.com/angellk>,
I think the chaosblade project belongs to the tag-observability. Maybe
the label should be tag-observability?
The project has presented the latest update with tag-observablity
including @alolita <https://github.com/alolita> on July 10. See the meeting
notes
<https://docs.google.com/document/d/1_QoF-njScSuGFI3Ge5zu-G8SbL6scQ8AzT1hq57bRoQ/edit>
for more information.
—
Reply to this email directly, view it on GitHub
<#1278 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAO2IAIDBZC6HENB6AKK3YLZLSZJ7AVCNFSM6AAAAABFC335KKVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDEMJZGUZDAMRZGA>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Chaosblade is one of China's earliest open-source projects in chaos engineering. Compared to similar projects like ChaosMesh or ChaosMeta, it has the largest user base and enterprise users in China. While its success is undeniable, the Chaosblade community seems to lack activities. There are several problems in the community now.
Associated data is here:
I know that the above problems are not only problems of chaosblade, but also common problems of most Chinese open-source projects, but I hope CNCF can do something about it. Let's build a better chaosblade and CNCF together! |
Thank you for your suggestion and advice on chaosblade. From your reply, I can feel your deep feelings for chaosblade, which makes me very touched. Regarding your question, I will reply here: We will invest more time in issue management in the future. You are also very welcome to provide valuable comments in subsequent regular meetings. Of course, you are also welcome to join the maintenance work of chaosblade. Let's build a better chaosblade and CNCF together! |
Moved application with new template to same place in the queue as this one. Closing to de-dupe. Thank you @MandssS ! |
This PR contains a proposal for ChaosBlade to be accepted into the CNCF Incubation stage.
ChaosBlade is a versatile Chaos Engineering platform that orchestrates chaos experiments on Kubernetes and Host environments.
By covering comprehensive fault injection methods in container, Pod, Node, network, file system, middleware, cloud vendor infrastructure, running application process, and even the kernel, ChaosBlade aims at providing a neutral, universal Chaos Engineering platform that enables cloud-native applications to be as resilient as they should be.