The extension discovers the Subnets use as targets for the blackhole subnet attack. The data is pulled from the AWS API periodically and includes the following information:
Supported Actions
Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!
No worries, our reliability experts are here to help: book a demo with them!