Start your 30 day free trial.
START FOR FREE

Blackhole Experiment

Supported platforms:

The Blackhole experiment drops inbound and outbound network traffic. You can specify the type of traffic to impact by hostname, port, IP address, and additional arguments.

Blackhole drops IP packets at the transport layer (Layer 4) of the OSI model. This includes TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) traffic. Like most network experiments, Blackhole does not impact traffic to and from api.gremlin.com by default. This allows the agent to communicate with the Gremlin Control Plane during an experiment. It does not impact DNS traffic for this same reason. If you want to drop DNS traffic, use the DNS experiment.

Options

Parameter Flag Default Version Description
IP Addresses -i IP address 0.0.1 Only impact traffic to these IP addresses. Also accepts CIDR values (i.e. 10.0.0.0/24 ).
Device -d interfaces Device discovery 0.0.1 Impact traffic over these network interfaces. Comma separated lists and multiple arguments supported. You can define multiple interfaces starting with agent version 2.30.0.
Hostnames -h hostnames ^api.gremlin.com 0.0.1 Only impact traffic to these hostnames.
Remote Ports -p port numbers ^53 0.0.1 Impact outgoing and incoming traffic to and from these remote ports. Also accepts port ranges (e.g. 8080-8085 ).
Local Ports -n port numbers 0.0.1 Impact outgoing and incoming traffic to and from these local ports. Also accepts port ranges (e.g. 8080-8085 ).
Protocol -P {TCP, UDP, ICMP} all 1.5.3 Only impact a specific protocol.
Providers WebUI and API Only 0.0.1 External service providers to affect.
Tags WebUI and API Only 0.0.1 Only impact traffic to hosts running Gremlin clients associated with these tags.
Don't Derive Exclusion Rules -E 2.51.1

Alternatively: --no-derived-exclusion-rules.

When this flag is not supplied, Gremlin will exclude its connection to api.gremlin.com, including intermediate proxies. This option disables that behavior.

Length -l int 60 0.0.1 The length of the experiment ().

Platform-specific notes

Linux

On Linux, Gremlin uses traffic policing features built into the Linux kernel to drop matching IP packets. This experiment requires the NET_ADMIN capability, which is enabled by default at installation time. See capabilities(7).

Windows

On Windows, Gremlin uses the Windows Filtering Platform to drop targeted IP packets.

Privileges required

On this page
Back to top