You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Network Delay | How much should the traffic be delayed? | 500ms |
22
+
| Jitter | Random +-30% jitter to network delay | true |
23
+
| Fail on Host Network | Emit failure when the targeted container is using the host network | true |
24
+
| Duration | How long should the traffic be affected? | 30s |
25
+
| Hostname | Restrict to which hosts the traffic is reduced ||
26
+
| IP Address | Restrict to which IP address the traffic is reduced ||
27
+
| Network Interface | Target Network Interface which should be attacked. All if none specified. ||
28
+
| Ports | Restrict to which ports the traffic is reduced ||
29
+
| TCP Data Packets Only |`beta` Delay only TCP data packets (PSH flag heuristic). UDP is not delayed. When you observe the actual delay being a multiple of the configured delay, you might choose this option to avoid delaying the TCP handshake. | false |
| Duration | How long should the traffic be delayed? | 30s |
24
+
| Hostname | Restrict to which hosts the traffic is delayed ||
25
+
| IP Address | Restrict to which IP address the traffic is delayed ||
26
+
| Network Delay | How much should the traffic be delayed? | 500ms |
27
+
| Network Interface | Target Network Interface which should be attacked. All if none specified. ||
28
+
| Port Number | Restrict to which port number the traffic is delayed ||
29
+
| Jitter | Random +-30% jitter to network delay | true |
30
+
| TCP Data Packets Only |`beta` Delay only TCP data packets (PSH flag heuristic). UDP is not delayed. When you observe the actual delay being a multiple of the configured delay, you might choose this option to avoid delaying the TCP handshake. | false |
0 commit comments