DNS Experiment
The DNS experiment blocks all outgoing traffic over the standard DNS port (<span class="code-class-custom">53</span>), optionally constrained by supplied IP addresses. This experiment is equivalent to running a Blackhole experiment against port <span class="code-class-custom">53</span>.
Linux
This experiment does not interact with <span class="code-class-custom">iptables</span>, and so it does not interfere with any existing <span class="code-class-custom">iptables</span> rulesets.
This experiment requires the <span class="code-class-custom">NET_ADMIN</span> capability, which is enabled by default at installation time. See capabilities(7)
Options
Parameter | Flag | Required | Default | Version | Description |
---|
IP Addresses | -i IP address | False | | 1.4.7 | Only impact traffic to these IP addresses. Also accepts CIDR values (i.e. 10.0.0.0/24 ). |
Device | -d interfaces | False | Device discovery | 0.0.1 | Impact traffic over these network interfaces. Comma separated lists and multiple arguments supported. You can define multiple interfaces starting with agent version 2.30.0. |
Protocol | -P {TCP, UDP, ICMP} | False | all | 1.4.7 | Only impact a specific protocol. |
Providers | WebUI and API Only | False | | 0.0.1 | External service providers to affect. |
Tags | WebUI and API Only | False | | 0.0.1 | Only impact traffic to hosts running Gremlin clients associated with these tags. |
Length | -l int | False | 60 | 1.4.7 | The length of the experiment (seconds). |