Steadybit logoReliability Hub
GitHubGitHub iconStart Free Trial
Steadybit logoReliability Hub

Delete Keys

AttackAttack
New
Deletes keys matching a pattern to simulate data loss scenarios
Targets:
Redis Databases
Install now

Delete Keys

Deletes keys matching a pattern to simulate data loss scenarios
AttackAttack
Install now

Delete Keys

AttackAttack
New
Deletes keys matching a pattern to simulate data loss scenarios
Install now

Delete Keys

Deletes keys matching a pattern to simulate data loss scenarios
AttackAttack
Install now
Go back to list

Introduction

With this action, Steadybit can delete keys matching a pattern in a Redis database to simulate data loss scenarios.

Use Cases

  • Simulate data loss to verify application resilience and cache rebuild logic.
  • Test how services handle missing cache entries.

Parameters

ParameterDescriptionDefault
DurationHow long the attack should last.60s
PatternKey pattern for deletion (e.g., 'user:', 'cache:').steadybit-test:*
Max KeysMaximum keys to delete (0 = unlimited).100
Restore On StopRestore deleted keys when attack stops (string values only).true

More Redis Database Actions

See all
Force Cache Expiration
New
Sets TTL on string keys matching a pattern to force them to expire
AttackAttack
Redis Databases
Start Using Steadybit Today

Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!

Are you unsure where to begin?

No worries, our reliability experts are here to help: book a demo with them!

Statistics
-Stars
Tags
Redis
Data Store
Cache
Homepage
hub.steadybit.com/extension/com.steadybit.extension_redis
License
MIT
MaintainerSteadybit
Install now
Steadybit logoReliability Hub
Start Free Trial
© 2026 Steadybit GmbH. All rights reserved.
Twitter iconLinkedIn iconGitHub icon