Steadybit logoResilience Hub
Try SteadybitGitHub icon
Steadybit logoResilience Hub

Fill Memory

Attack

Attack

Allocates and holds memory.
Install now

Fill Memory

Allocates and holds memory.
Attack

Attack

Targets:

Hosts

Install now

Fill Memory

Attack

Attack

Allocates and holds memory.
Install now

Fill Memory

Allocates and holds memory.
Attack

Attack

Targets:

Hosts

Install now
Go back to list

Introduction

Allocates a specific amount of memory.

Usage

Note that this can cause systems to trip the Linux Kernel OOM killer without enough physical or swap Memory. The operating system may swap out the allocated memory. This attack doesn't take swap memory into account.

In contrast to the Stress Memory action, this actions tries to reduce the CPU usage as much as possible.

When using the attack to meet a specific memory usage, it may allocate or free memory to reach the desired memory usage.

If you specify a usage that exceeds the total memory (e.g. > 100%) it fills up the memory as much as possible until the process is oomkilled, as it's impossible to reach usages higher than 100%.

Use Cases

  • Test the system's ability to handle memory spikes.
  • Observe the system's behavior when it runs out of memory.
  • Observe the system's behavior when it runs low on memory for file buffers.

Parameters

ParameterDescriptionDefault
DurationHow long should memory be wasted?30s
ModeFill and meet specified usage: Fill up the memory until the desired usage is met. Memory allocation will be adjusted constantly to meet the target.
Fill the specified amount: Allocate and hold the specified amount of Memory.
Fill and meet specified usage
SizePercentage of total memory or Megabytes:% of total memory
Fail on OOM KillShould it be treated as a failure when the memfill process was oomkilled?False
Statistics
-Stars
Tags
Host
Kubernetes
Network
Homepage
hub.steadybit.com/extension/com.steadybit.extension_host
License
MIT
MaintainerSteadybit
Install now

More Host Actions

See all
Block DNS

Blocks access to DNS servers

Attack

Attack

Hosts

Start Using Steadybit Today

Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!

Are you unsure where to begin?

No worries, our reliability experts are here to help: book a demo with them!

Steadybit logoResilience Hub
Try Steadybit
© 2024 Steadybit GmbH. All rights reserved.
Twitter iconLinkedIn iconGitHub icon