Now let’s run the experiment. Open the Gremlin web app. Click on Attacks in the left navigation bar, then click New Attack.
Under What do you want to attack?, select Infrastructure, then Containers. Note that we selected Containers instead of Hosts this time. We’ll also use the search box to search for specific containers. Click on Exact on the right-hand side, then click on the search box and enter
catalogue. You should see the following screen:
name:"catalogue" to select the container. Repeat this process for the
catalogue-db container. Once you’ve selected both services, your screen should look like this:
You can see that the blast radius for this experiment is small: just two containers. However, looks can be deceiving. If these containers are critical, then this small set of containers are holding up our entire application.
Under Choose a Gremlin, select Network followed by Blackhole.
For the configuration, change Length to
360 seconds and leave everything as it is. This will drop all traffic across all network interfaces and ports in both directions.
Next, click Unleash Gremlin to start the experiment.