aboutsummaryrefslogtreecommitdiffstats
path: root/yardstick/benchmark/scenarios/availability/attacker_conf.yaml
AgeCommit message (Collapse)AuthorFilesLines
2017-02-17Update missing license headersDeepak S1-0/+8
Change-Id: I063fd37fe25754c94d164ae5a209d15b69322093 Signed-off-by: Deepak S <deepak.s@linux.intel.com>
2016-07-29Create Bash Sheel Utilitiestjuyinkanglin1-0/+12
JIRA: YARDSTICK-277 Change-Id: I7379d4fe375d22e544ab93b48d56a017a60c4b9f Signed-off-by: tjuyinkanglin <14_ykl@tongji.edu.cn>
2016-07-18code clean uptjuyinkanglin1-1/+1
JIRA: YARDSTICK-272 Change-Id: Id2f1b3d1beff8843700cdfcaaa1e8f496f445ed9 Signed-off-by: tjuyinkanglin <14_ykl@tongji.edu.cn>
2016-06-25Creating a generic attackerqiujuan1-0/+4
JIRA: YARDSTICK-273 Change-Id: Id81b554b559d14ced440a1fa004d14d791fd2306 Signed-off-by: qiujuan <juan_qiu@tongji.edu.cn>
2016-01-10The secondi HA test case-shutdown controllerwym_libra1-0/+13
1) add "attacker_baremetal.py" for fault injection 2) modify the monitor to excute on remote node after ssh connection 3) move all shell scripts together JIRA: YARDSTICK-182 Change-Id: Ibb9dc908224ddb8b99a0140b75c1a046503f6dfb Signed-off-by: wym_libra <yimin.wang@huawei.com>