Skip to content

Latest commit

 

History

History
executable file
·
30 lines (25 loc) · 1.36 KB

README.md

File metadata and controls

executable file
·
30 lines (25 loc) · 1.36 KB

ChaoSlingr Diagram

HACKRU challenge

Best pull request for a feature or experiment (deadline is Sunday)

How to begin

You will need docker, node, and python installed on your workstation

  1. git clone -b hackru https://github.com/Optum/ChaoSlingr.git
  2. virtualenv hacked
  3. source hacked/bin/activate
  4. pip install localstack
  5. npm install -g aws-sam-local
  6. localstack start or if you want to run in background localstack start &
  7. aws --endpoint-url=http://localhost:4572 s3api create-bucket --bucket test-bucket --region us-east-1 (you just made your first AWS call!)
  8. cd test/bucketpolicy
  9. sam local invoke slingrFunction -e slingr_event.json (just ran your first experiment!)

If you found AWS Credit begin by

Find some AWS credit and make your own account to move from local env to public cloud. You will need

Using SAM

  1. git clone -b hackru https://github.com/Optum/ChaoSlingr.git
  2. npm install -g aws-sam-local
  3. cd src/lambda/bucketpolicy
  4. sam deploy --template-file ./packaged.yaml --stack-name chaostest --capabilities CAPABILITY_IAM

ChaoSlingr: Introducing Security into Chaos Testing

ChaoSlingr is a Security Chaos Engineering Tool focused primarily on the experimentation on AWS Infrastructure to bring system security weaknesses to the forefront.

Join the community - https://chaoslingr.slack.com