Steadybit logoReliability Hub
GitHubGitHub iconStart Free Trial
Steadybit logoReliability Hub

Block Traffic

AttackAttack
Blocks network traffic (incoming and outgoing)
Targets:
Containers
Install now

Block Traffic

Blocks network traffic (incoming and outgoing)
AttackAttack
Targets:
Containers
Install now

Block Traffic

AttackAttack
Blocks network traffic (incoming and outgoing)
Targets:
Containers
Install now

Block Traffic

Blocks network traffic (incoming and outgoing)
AttackAttack
Targets:
Containers
Install now
Go back to list

Introduction

Drops all network traffic (IN/OUT/FORWARDED).

Details

Note: If you are going to attack containers using network attacks, all containers in the target's linux network namespace (e.g. all containers belonging to the same Kubernetes Pod or Replica Set) will be affected. In case you want to target the traffic of a single container in the namespace you can for example use the port parameter to limit the blast radius.

This attack affects network traffic for protocols that use port numbers (e.g., TCP, UDP). Protocols like ICMP, which do not use ports, remain unaffected and will continue to function normally.

Use Cases

  • Understand how your services behave under network outages

Parameters

ParameterDescriptionDefault
Fail on Host NetworkEmit failure when the targeted container is using the host networktrue
DurationHow long should the traffic be affected?30s
HostnameRestrict to which hosts the traffic is reduced
IP AddressRestrict to which IP address the traffic is reduced
PortsRestrict to which ports the traffic is reduced

Useful Templates (4 of 21)

See all
Kubernetes deployment survives Redis downtime

Check that your application gracefully handles a Redis cache downtime and continues to deliver its intended functionality. The cache downtime may be caused by an unavailable Redis instance or a complete cluster.

Motivation

Redis downtime can lead to degraded system performance, lost data, and potentially long system recovery times. By testing your system's resilience to Redis downtime, you can ensure that it can handle the outage gracefully and continue to deliver its intended functionality. Additionally, you can identify any potential weaknesses in your system and take appropriate measures to improve its performance and resilience.

Structure

We will verify that a load-balanced user-facing endpoint fully works while having all pods ready. As soon as we simulate Redis downtime, we expect the system to indicate unavailability appropriately and maintain its throughput. We can block the traffic to the Redis instance to simulate downtime. The experiment aims to ensure that your system can gracefully handle the outage and continue delivering its intended functionality. The performance should return to normal after the Redis instance is available again.

Redis
Recoverability
Datadog

More Container Actions

See all
Start Using Steadybit Today

Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!

Are you unsure where to begin?

No worries, our reliability experts are here to help: book a demo with them!

Statistics
-Stars
Tags
Container
Kubernetes
Network
Block Traffic
Homepage
hub.steadybit.com/extension/com.steadybit.extension_container
License
MIT
MaintainerSteadybit
Install now
Steadybit logoReliability Hub
Start Free Trial
© 2025 Steadybit GmbH. All rights reserved.
Twitter iconLinkedIn iconGitHub icon