Steadybit logoResilience Hub
Try SteadybitGitHub icon
Steadybit logoResilience Hub

Package Corruption

Attack

Attack

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Install now

Package Corruption

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Attack

Attack

Targets:

Containers

Install now

Package Corruption

Attack

Attack

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Install now

Package Corruption

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Attack

Attack

Targets:

Containers

Install now
Go back to list

Introduction

Inject corrupt packets by introducing single bit error at a random offset into network traffic.

Details

Note: If you are going to attack containers using network attacks, all containers in the target's namespace (e.g. all containers belonging to the same Kubernetes Pod or Replica Set) will be affected. In case you want to target the traffic of a single container in the namespace you can for example use the port parameter to limit the blast radius.

Use Cases

  • Testing network resilience to bit errors

Parameters

ParameterDescriptionDefault
Package CorruptionHow much of the traffic should be corrupted?15%
Fail on Host NetworkEmit failure when the targeted container is using the host networktrue
DurationHow long should the traffic be affected?30s
HostnameRestrict to which hosts the traffic is reduced
IP AddressRestrict to which IP address the traffic is reduced
Network InterfaceTarget Network Interface which should be attacked. All if none specified.
PortsRestrict to which ports the traffic is reduced
Statistics
-Stars
Tags
Container
Kubernetes
Network
Homepage
hub.steadybit.com/extension/com.steadybit.extension_container
License
MIT
MaintainerSteadybit

More Container Actions

See all
Block DNS

Blocks access to DNS servers

Attack

Attack

Containers


Start Using Steadybit Today

Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!

Are you unsure where to begin?

No worries, our reliability experts are here to help: book a demo with them!

Steadybit logoResilience Hub
Try Steadybit
HubActionsTargetsAdviceExtensionsRecipes
© 2024 Steadybit GmbH. All rights reserved.
Twitter iconLinkedIn iconGitHub icon