Target
Kong routes are discovered, including some of their most relevant metadata.
Supported Actions
Leverage the Kong request-termination plugin to inject HTTP failures for specific Kong routes.
Attack
Kong routes
Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!
No worries, our reliability experts are here to help: book a demo with them!