Contribute
Commonly used Attacks
Blocks network traffic (incoming and outgoing).
Attack
Containers
Simulates an outage of an entire availability zone.
Zones
Triggers DB cluster failover by promoting a standby instance to primary
RDS clusters
Reboot, terminate, stop or hibernate EC2 instances
EC2-instances
Generate CPU load for one or more cores
Hosts
Leverage the Kong request-termination plugin to inject HTTP failures at Kong service level.
Kong services
Sometimes you may have special needs. You can author your own extensions. Learn how to do so!
No worries, our reliability experts are here to help: book a demo with them!
Commonly used Checks
Execute HTTP calls and verify responses periodically.
Check
Gather and check Prometheus metrics.
Prometheus instances
Collects information about the monitor status and optionally verifies that the monitor has an expected status.
Datadog monitors
Runs a K6 load test.
Load Test
Verifies Kubernetes Deployment pod counts
Kubernetes deployments
Execute a Postman collection through Postman's cloud API.
Postman Collections
Learn how organizations such as Salesforce and ManoMano have elevated their system resilience to new heights with Steadybit.