Infrastructure Layer

Attacks

An attack is a method of injecting failure into a system in a simple, safe, and secure way. The Gremlin Platform provides a range of attacks which you can run against your infrastructure. This includes impacting system resources, delaying or dropping network traffic, shutting down hosts, and more.

The Gremlin Platform provides three categories of attacks: resource attacks, network attacks, and state attacks. Resource attacks test against sudden changes in consumption of computing resources, network attacks test against against unreliable network conditions, and state attacks test against unexpected changes in your environment such as power outages, node failures, clock drift, or application crashes. In addition to running attacks, you can also schedule regular or recurring attacks, create attack templates, and view attack reports.

Visit the attack creation page to start testing your infrastructure today. Go to the attacks list page to monitor ongoing and historic attacks.

Each attack, or "gremlin", tests your resilience in a different way:

Resource Gremlins

Resource gremlins are a great starting point -- simple to run and understand. They reveal how your service degrades when starved of CPU, memory, IO, or disk.

GremlinImpact
CPUGenerates high load for one or more CPU cores.
MemoryAllocates a specific amount of RAM.
IOPuts read/write pressure on I/O devices such as hard disks.
DiskWrites files to disk to fill it to a specific percentage.

State Gremlins

State gremlins introduce chaos into your infrastructure so that you can observe how well your service handles it or fails.

GremlinImpact
ShutdownPerforms a shutdown (and an optional reboot) on the host operating system to test how your system behaves when losing one or more cluster machines.
Time TravelChanges the host's system time, which can be used to simulate adjusting to daylight saving time and other time-related events.
Process KillerKills the specified process, which can be used to simulate application or dependency crashes. (Note: does not work for PID 1, consider a Shutdown attack instead)

Network Gremlins

Network gremlins allow you to see the impact of lost or delayed traffic to your application. Test how your service behaves when you are unable to reach one of your dependencies, internal or external. Limit the impact to only the traffic you want to test by specifying ports, hostnames, and IP addresses.

GremlinImpact
BlackholeDrops all matching network traffic.
LatencyInjects latency into all matching egress network traffic.
Packet LossInduces packet loss into all matching egress network traffic.
DNSBlocks access to DNS servers.

Warning: Important considerations for targeting Kubernetes Pods with Network Attacks

Network host tags

Tags can be utilized for targeting IP addresses to which traffic should be impacted during network attacks. This is important for today's ephemeral environments where hosts live for a short time and have dynamic IP addresses. As custom tags are used to indicate where an attack should run, the same tags can be used to indicate the hosts to which network traffic should be impacted. For example, to test latency between serviceA and serviceB, select all clients with the tag service:serviceA when choosing the Hosts to target, and select the tag service:serviceB when configuring the Network Gremlin to run.

Network providers

Limit the blast radius of a network attack to specific external service providers. Select one or many AWS services and their associated region to impact. The destination network configuration is automatically updated daily using an AWS discovery service.

Attack stage progression

Every Attack on Gremlin is composed of one or more Executions, where each Execution is an instance of the attack running on a specific target.

The Stage progression of an Attack is derived from the Stage progression of all of an Attack's Executions. Gremlin weighs the Importance of Stages so as to mark an Attack with the most important Stage of its executions.

Example

An Attack with three Executions will derive its final reported stage by picking the most important stage from among its executions. So, if the three Execution Stages are TargetNotFound, Running, TargetNotFound, the resulting stage for the Attack will be Running.

You can see Stages ordered by their importance below.

Stages

Stages are sorted by descending order of importance (the Running Stage holds the highest importance)

StageDescription
RunningAttack running on the host
HaltAttack told to halt
RollbackStartedCode to rollback has started
RollbackTriggeredDaemon started a rollback of client
InterruptTriggeredDaemon issued an interrupt to the client
HaltDistributedDistributed to the host but not yet halted
InitializingAttack is creating the desired impact
DistributedDistributed to the host but not yet running
PendingCreated but not yet distributed
FailedClient reported unexpected failure
HaltFailedHalt on client did not complete
InitializationFailedCreating the impact failed
LostCommunicationClient never reported finishing/receiving execution
ClientAbortedSomething on the client/daemon side stopped the Gremlin and it was aborted without user intervention
UserHaltedUser issued a halt, and that is now complete
SuccessfulCompleted running on the Host
TargetNotFoundAttack not scoped to any current targets

Monitor attacks in real time

Observe your environments in real time in the Gremlin UI, for CPU or Shutdown experiments, to quickly verify the effect of your experiments.

Monitor CPU attacks in real time

Company Admins and Owners can turn this feature on for their company by visiting the "Company Settings", clicking on the "Settings", and toggling "Attack Visualizations" on. No data is collected when attacks are not running and only data relevant to the attack is collected:

  • CPU: statistics for CPU load
  • Shutdown" machine uptime

In addition, to prevent any host from sending metrics to populate these charts, add PUSH_METRICS="0" to the configuration for 'gremlind' on that host. This will override the company preference and will prevent that particular host from sending metrics.

Parameter reference

For details on parameters supplied to individual attacks, check out the links to each attack at the top of this page.

Multiple values

Port and address options can be used multiple times in a single command.

bash
1# Attack both DynamoDB and database.mydomain.org
2gremlin attack latency -h dynamodb.us-west-1.amazonaws.com -h database.mydomain.org

Alternatively, a , can also be used to specify multiple values.

bash
1gremlin attack latency -p 8080,443

Exclude rules

A ^ can be used before a port or address to exclude that argument from the set of impacted network targets.

Note: If only exclude rules are supplied, all other traffic is impacted.

bash
1# Slow down all ports except DNS port
2gremlin attack latency -p ^53

This can be particularly useful for excluding a specific IP from a range that is otherwise impacted by the attack.

bash
1# Blackhole all hosts in 10.0.0.0/24 except for 10.0.0.11
2gremlin attack blackhole -i 10.0.0.0/24 -i ^10.0.0.11

Device discovery

All network attacks accept a --device argument that refers to the network interface to target. Gremlin network attacks target only one network interface at a time. When unspecified, Gremlin chooses an interface according to the following order of operations:

  • Gremlin omits all loopback devices (determined by RFC1122).
  • Gremlin selects the device with the lowest interface index that starts with eth, en, or for Windows Ethernet.
  • If nothing was found, Gremlin selects the device with the lowest interface index that is non-private (according to RFC1918).
  • If nothing was found, Gremlin selects the first device with the lowest interface index.

Troubleshooting attacks

If you are experiencing problems running attacks, such as receiving "Attack Interrupted" errors, please check our knowledge base for more information.

The following sub-sections have moved. They are preserved here to support older links.