Target
Kong services are discovered, including some of their most relevant metadata.
Supported Actions
Leverage the Kong request-termination plugin to inject HTTP failures at Kong service level.
Attack
Kong services
Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!
No worries, our reliability experts are here to help: book a demo with them!