Improving system stability with Gremlin Resource Attacks
Modern computers are extremely powerful, but even the highest-end systems have limited resources. When CPU, RAM, disk capacity, and I/O are stressed, the impact on your services can be catastrophic.
By running resource attacks as part of a Chaos Engineering practice, you can stay ahead of capacity problems through right-sizing, configuring and testing autoscaling, and more.
Join us as we explore each of Gremlin’s resource attacks—CPU, memory, disk, and I/O. We will explain what each attack does, various use cases where you would want to use each attack, and how to execute the attack as part of a chaos experiment.
Thank you for registering for this on-demand event. You will receive an email momentarily with a link to watch the session.
About this webinar
We will also show how to safely and thoughtfully conduct Chaos Experiments with Gremlin including adjusting the experiment’s magnitude and blast radius, observing the impact, and halting experiments when our systems enter an unstable state.
- Explore each of the four unique resource attacks available in Gremlin.
- Explain the use cases for each attack type.
- Demonstrate how to run each attack and gain actionable insights from their results in order to improve your services and systems.
Proactively improve reliability
Explore our tutorials to learn about the technologies and processes that help you manage reliability to a higher standard