Cause packet loss for matching outgoing network traffic.
If you are not using our container images for the extension, you need install the tc (from the iproute2 package) tool to use the attack.
More Host Actions
Blocks access to DNS servers
Drops network traffic (incoming and outgoing)
Inject latency into network traffic.
Fill available disk space
Reduce the available network bandwidth.
Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!
No worries, our reliability experts are here to help: book a demo with them!