Fault Injection
ExperimentsDNS Experiment
The DNS experiment blocks all outgoing traffic over the standard DNS port (53
), optionally constrained by supplied IP addresses. This experiment is equivalent to running a Blackhole experiment against port 53
.
Linux
This experiment does not interact with iptables
, and so it does not interfere with any existing iptables
rulesets.
This experiment requires the NET_ADMIN
capability, which is enabled by default at installation time. See capabilities(7)
Options
Parameter | Flag | Required | Default | Version | Description |
---|---|---|---|---|---|
IP Addresses | -i IP address | False | 1.4.7 | Only impact traffic to these IP addresses. Also accepts CIDR values (i.e. 10.0.0.0/24 ). | |
Device | -d interfaces | False | Device discovery | 0.0.1 | Impact traffic over these network interfaces. Comma separated lists and multiple arguments supported. You can define multiple interfaces starting with agent version 2.30.0. |
Protocol | -P {TCP, UDP, ICMP} | False | all | 1.4.7 | Only impact a specific protocol. |
Providers | WebUI and API Only | False | 0.0.1 | External service providers to affect. | |
Tags | WebUI and API Only | False | 0.0.1 | Only impact traffic to hosts running Gremlin clients associated with these tags. | |
Length | -l int | False | 60 | 1.4.7 | The length of the experiment (seconds). |