Modern computers are extremely powerful, but even the highest-end systems have limited resources. When CPU, RAM, disk capacity, and I/O are stressed, the impact on your services can be catastrophic.
By running resource attacks as part of a Chaos Engineering practice, you can stay ahead of capacity problems through right-sizing, configuring and testing autoscaling, and more.
Join us as we explore each of Gremlin’s resource attacks—CPU, memory, disk, and I/O. We will explain what each attack does, various use cases where you would want to use each attack, and how to execute the attack as part of a chaos experiment.
We will also show how to safely and thoughtfully conduct Chaos Experiments with Gremlin including adjusting the experiment’s magnitude and blast radius, observing the impact, and halting experiments when our systems enter an unstable state.
Explore each of the four unique resource attacks available in Gremlin.
Explain the use cases for each attack type.
Demonstrate how to run each attack and gain actionable insights from their results in order to improve your services and systems.
Gremlin empowers you to proactively root out failure before it causes downtime. See how you can harness chaos to build resilient systems by requesting a demo of Gremlin.Get started