Steadybit logoResilience Hub
Try SteadybitGitHub icon
Steadybit logoResilience Hub

Block Traffic

Attack

Attack

Blocks network traffic (incoming and outgoing).
Install now

Block Traffic

Blocks network traffic (incoming and outgoing).
Attack

Attack

Targets:

Containers

Install now

Block Traffic

Attack

Attack

Blocks network traffic (incoming and outgoing).
Install now

Block Traffic

Blocks network traffic (incoming and outgoing).
Attack

Attack

Targets:

Containers

Install now
Go back to list

Introduction

Drops all network traffic (IN/OUT/FORWARDED).

Details

Note: If you are going to attack containers using network attacks, all containers in the target's linux network namespace (e.g. all containers belonging to the same Kubernetes Pod or Replica Set) will be affected. In case you want to target the traffic of a single container in the namespace you can for example use the port parameter to limit the blast radius.

Use Cases

  • Understand how your services behave under network outages

Parameters

ParameterDescriptionDefault
Fail on Host NetworkEmit failure when the targeted container is using the host networktrue
DurationHow long should the traffic be affected?30s
HostnameRestrict to which hosts the traffic is reduced
IP AddressRestrict to which IP address the traffic is reduced
Network InterfaceTarget Network Interface which should be affected. All if none specified.
PortsRestrict to which ports the traffic is reduced
Statistics
-Stars
Tags
Container
Kubernetes
Network
Homepage
hub.steadybit.com/extension/com.steadybit.extension_container
License
MIT
MaintainerSteadybit

Useful Recipes (4 of 9)

See all
Verify system unavailability status during Redis downtime

Check that your application handles a Redis cache downtime gracefully and continues to deliver its intended functionality. The cache downtime may be an unavailable Redis instance or a complete cluster.

Tags:
Redis
Recoverability
Targets:

Containers

Datadog monitors

Kubernetes deployments

More Container Actions

See all
Block DNS

Blocks access to DNS servers

Attack

Attack

Containers


Start Using Steadybit Today

Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!

Are you unsure where to begin?

No worries, our reliability experts are here to help: book a demo with them!

Steadybit logoResilience Hub
Try Steadybit
HubActionsTargetsAdviceExtensionsRecipes
© 2024 Steadybit GmbH. All rights reserved.
Twitter iconLinkedIn iconGitHub icon