Start your 30 day free trial.
START FOR FREE
Docs Home

Release Notes - Windows

1.21.0
December 4, 2024
  • New Introducing experiment GPU, which will attempt to exhaust all compute resources for the system's GPUs.
  • Info Updated dependencies
1.20.1
September 17, 2024
  • FixResolved startup issue on Windows targets with more than 64 processors.
1.20.0
August 22, 2024
  • New Dependency Discovery now uses open connections in combination with DNS records to discover only hostnames for which the Gremlin Agent has seen an active connection. Users should no longer see dependencies discovered for services that only make DNS queries to a particular hostname, but never actually connect to them.
  • Info Updated dependencies
1.19.2
August 2, 2024
  • Info Updated dependencies
1.19.1
July 18, 2024
  • Info Improved logging around actions the Gremlin agent takes to rollback active experiments.
1.19.0
July 11, 2024
  • New Blackhole experiments now automatically add the route to the Gremlin service to the exclusion rules so that connection is maintained during the attack. This can be disabled if needed via --no-derived-exclusion-rules.
  • Info Updated dependencies
1.18.1
June 27, 2024
  • Fix Fixed bugs with the Gremlin Agent's session renewal process, cleaning up spurrious Unauthorized errors and preventing rare instances where local session storage can get corrupted.
  • Info Updated dependencies
1.18.0
June 18, 2024
  • New The Gremlin Agent now reports the DNS servers that are used by the host on which it is installed. This data is used to select a random DNS server to impact for our new Redundancy: DNS reliability test, available from the Well-Architected Cloud Test Suite.
  • Fix Upon receiving a shutdown signal, the Gremlin Agent will wait for any running attacks to finish halting before shutting down. This fixes an issue where attacks would end up Failed or LostCommunication instead of ClientAborted when the Gremlin Agent was terminated during such attacks.
  • Fix A more detailed error message is provided at install time when any MSI actions fail.
  • Info Updated dependencies
1.17.1
May 1, 2024
  • Fix Improved logging in situations where gremlind cannot open or parse configuration and certificate files.
  • Info Updated dependencies
1.17.0
April 12, 2024
  • InfoAdd logging for troubleshooting Windows validation errors.
  • InfoBetter error message for failing to load certificates.
  • InfoUpdated dependencies.
1.16.0
April 3, 2024
  • NewWindows support for experiment Process Exhaustion, a way to consume processes to identify limits within the target system.
  • NewAdded DNS dependency feature to Windows installer. It will be enabled automatically if a valid Windows Pcap library is already installed.
  • FixRolling back network attacks no longer considers missing network devices as a critical error. This accounts for failure modes where the network device is torn down externally.
1.15.0
February 28, 2024
  • NewDuring a rollback, the gremlind process tells the associated attack told to tear down before it attempts to remove any remaining impact.
  •    InfoImproved logging in daemon.log when attacks are rolled back.
  •    InfoRaised the TCP connect timeout for API requests that transition attacks between stages from 1 second to 5 seconds.  
1.14.2
February 27, 2024
  • InfoAdded log messages to suggest turning on DNS collection.
1.14.1
February 15, 2024
  • FixAddressed an issue where rollback would fail when no teardown was required.
1.14.0
February 14, 2024
  • FixInstall the right Windows driver that matches the KMDF (Kernel-Mode Driver Framework) version.
1.13.2
February 7, 2024
  • NewAdded a new DNS-based dependency collection feature. Learn more about this feature here.
  • FixPrint full error on rollback failures.
  • InfoUpdated dependencies.
1.13.1
January 16, 2024
  • Fix: Apply latency with high accuracy on Windows Server 2016
1.13.0
January 10, 2024
  • Fix: Resolved latency issues on ESXi virtual machines
  • Info: Updated dependencies
1.12.0
December 7, 2023
  • New Provided Gremlin has access to a valid AWS credentials chain, it now interprets AWS ARN values in GREMLIN_TEAM_ID, GREMLIN_TEAM_SECRET, GREMLIN_TEAM_CERTIFICATE_OR_FILE, GREMLIN_TEAM_PRIVATE_KEY_OR_FILE. Gremlin supports ARN values from AWS Secrets Manager or AWS Systems Manager Parameter Store. Gremlin can optionally be supplied with GREMLIN_IAM_ROLE to specify a role to assume for the strict purpose of fetching secret values.
  • Fix More context is added to various error messages
  • Fix: Regression introduced in 1.11.0 where attacks with invalid arguments would end up Lost Communication instead of Failed
  • Info Updated dependencies
1.11.0
November 14, 2023
  • New Attacks can sometimes fail to notify the Gremlin Control Plane when its connection is impacted by the attack itself. The Gremlin agent now tolerates these failures more often and attempts to resend failed notifications. This fixes attacks that end up in the HaltFaled stage that would otherwise finish in the Successful stage.
1.10.1
November 7, 2023
  • New Improved the output of the Gremlin Agent validation routine that happens on startup. When validation fails, details about the failure are written to daemon.log.
1.10.0
October 20, 2023
  • Fix Fixed an issue where attacks were incorrectly labeled HaltFailed when Gremlin fails to notify api.gremlin.com during teardown of the network impact.
  • New For users running Gremlin on AWS, more error information is printed to the log file when AWS metadata cannot be retrieved.
  • Info Updated dependencies
1.9.7
July 7, 2023
  • Fix Errors related to spawning subprocesses now have more detailed information useful for troubleshooting.
1.9.6
June 30, 2023
  • Fix For hostnames supplied to network attacks, Gremlin delegates DNS queries to the operating system. When this query fails, Gremlin now attemps to resolve the name completely within the running process in an attempt to overcome operating system failures. This allows Gremlin network attacks to continue in the face of failed DNS processing.
1.9.5
June 9, 2023
  • Fix Fixed a bug where Latency attacks would attempt to target multiple network interfaces, which is not yet supported. An error is now returned if --device is used to specify multiple network interfaces for a Latency attack. If no --device is specified, Gremlin will choose the highest priority device it finds.
  • Info Updated dependencies.
1.9.4
May 10, 2023
  • Fix Gremlin now tears down the TCP connection pool with api.gremlin.com after successive timeout failures.
  • Fix Gremlin includes the name of the targeted network interface in execution log events related to applying network impact.
  • Info Updated dependencies.
1.9.3
March 29, 2023
  • Info Added support for tag values to be any simple YAML datatype (boolean, integer, float, string). Previously only strings were supported.
  • Info Updated dependencies.
1.9.2
March 23, 2023
  • Fix Fixed an issue that prevented Gremlin from ingesting Azure Tags.
  • Fix Fixed an issue that made Gremlin validation unreliable.
  • Info Updated dependencies.
1.9.1
March 15, 2023
  • New Gremlin's version command now prints more build information.
  • Info Updated dependencies.
1.9.0
March 14, 2023
  • New Multiple network interface attacks are now supported. Details are available in Network device selection.
  • Info Updated dependencies.
1.8.3
January 5, 2023
  • Fix Fix a bug in collect_certs when the target dropped the network connection before completing the TLS setup.
  • Fix Only consider IPv4 addresses for the default Gremlin Identifier.
  • Info Updated help URLs.
  • Info Updated dependencies.
1.8.2
November 22, 2022
  • Fix Fix a bug that prevented collect_certs from working when run against a container.
  • Info Updated dependencies.
1.8.1
November 21, 2022
  • New Add a short argument (-n) for the not_less_than option.
  • Info Updated dependencies.
1.8.0
November 16, 2022
  • New Introduce Certificate Expiry test for Reliability Management.
  • Info Updated dependencies.
1.7.3
October 28, 2022
  • Fix Fixed a bug where Gremlin would not properly launch attacks that resolve to a large amount of IP addresses / blocks.
1.7.2
August 31, 2022
  • Fix: Fixed a bug where Gremlin would not properly include swap in free memory calculations, leading to incorrect attack results.
  • Info: Updated dependencies.
1.7.1
July 29, 2022
  • Fix: Fixed a bug where Gremlin would attempt to allocate more memory than was available when the cgroup attribute memory.limit_in_bytes was higher than available system memory.
  • Info: Updated dependencies.
1.7.0
July 26, 2022
  • New: Gremlin's Memory attack now has a new argument: --allocation-strategy (-s), which informs Gremlin on how to interpret other memory consumption arguments: --percent, --mb, and --gb. See more at Memory: Options
  • Info: Updated dependencies.
1.6.1
May 23, 2022
  • Fix: Correctly handle proxy usernames and passwords that contain special characters. Special characters must be percent-escaped. For example, %5C is used in place of a backslash. Details are available here.
  • Info: Updated dependencies.
1.6.0
May 9, 2022
  • New: Disk attack improvements. The Disk attack is much faster, more accurate, and safer.
  • New: Gremlin now reads custom Azure tags associated with the machine and makes those tags available for targeting.
  • Fix: Fixed a bug where Gremlin would fail validation if the DNS lookup of api.gremlin.com failed. This was likely to be a problem in high security environments.
  • Fix: Fixed a bug where Gremlin would crash on some operating systems when process collection was enabled. Gremlin avoids crashing and disables process collection when errors are detected.
  • Fix: Fixed a bug where Gremlin used to skip tag configuration even when it had a valid session. Gremlin now always configures tags on startup as long as it can communicate with the Gremlin control plane.
  • Fix: Some automatic Azure tags were not being correctly read. The azEnvironment, location, name, osType, privateIpAddress, publicIpAddress, sku, vmId, vmSetScaleName, and zone tags are all automatically read and available for targeting.
  • Info: Removed NTP timestamp from gremlin check os.
  • Info: Updated dependencies.
1.5.1
January 21, 2022
  • Info: Updated Rust version used to build agent in response to CVE-2022-21658
1.5.0
December 3, 2021
  • New: On startup, the Gremlin agent now performs some validation on its ability to run a CPU and Latency attack. Validation results are accessible through the Clients API.
  • Info: Updated dependencies
1.4.1
November 16, 2021
  • Info: Updated dependencies
1.4.0
October 25, 2021
  • New: The Disk attack has been significantly improved. In most cases it is much faster, more accurate, and safer. It also uses significantly less CPU and RAM when filling disk volumes. The improved version is used when the environment variable GREMLIN_DEUCHAINN_EN1023 is set to true; all other values are treated as false. This environment variable may be ignored or removed in a future version without notice.
1.3.1
October 20, 2021
  • Fix: Fixed bug with Gremlin's IO attack cleanup when --mode r or --mode w was used. Previously, Gremlin would try to tear down files that did not exist, leading to attack failures.
  • Info: Improve messages reported by the Gremlin IO attack, when file-creation errors occur.
1.3.0
October 8, 2021
  • Info: Changed the way PUSH_METRICS boolean configuration variable is evaluated. Previously, any non-empty value other than "0" would evaluate to true (e.g. PUSH_METRICS=false would evaluate to true). This has been changed to provide expected outcomes: the only values that evaluate true are now "1", "true", and "TRUE", leaving all other values to evaluate to false.
  • Info: Updated dependencies
1.2.4
September 27, 2021
  • Fix: Fixed a bug where the Gremlin agent does not properly roll back time travel attacks with an offset of 5 seconds or less.
1.2.3
September 10, 2021
  • New: The percent argument for Disk attacks now accepts real numbers. For example, --percent 27.5 was previously unsupported.
  • Fix: Gremlin now correctly determines the local hostname making the automatic local-hostname available for targetting.
  • Fix: API interactions made by the Gremlin agent now always send the appropriate Content-Type header value.
  • Info: Updated dependencies
1.2.2
August 19, 2021
  • Fix: Fixed a bug where the CPU attack would not affect all processors on systems with more than 64 processors.
  • Info: Updated dependencies
1.2.1
August 2, 2021
  • Info: Updated dependencies
1.2.0
July 15, 2021
  • Fix: This update fixes Memory attack bugs. Previously, the amount of memory consumed would be limited to RAM. Memory attacks with this update include swap space / all virtual memory.
  • New: The Memory attack is more "aggressive" in the sense that the memory allocated by Gremlin during the attack is more difficult to swap to disk.
1.1.14
June 29, 2021
  • Info: Updated dependencies.
1.1.13
June 15, 2021
  • New: The Gremlin CLI now has a gremlin check daemon subcommand which reports on the status of any running Gremlin agent.
  • Info: Updated dependencies.
1.1.12
April 29, 2021
  • Info Updated dependencies.
1.1.11
April 26, 2021
  • Info Updated dependencies.
1.1.10
April 14, 2021
  • Fix While never observed, according to the Windows API documentation, getting the current username can fail. If that happened the Gremlin Client would fail to run an attack. Instead, this version resorts to using "unknown" if the username cannot be determined.
1.1.9
April 5, 2021
  • New Daemon log file management improvements. Previously, the log file was truncated at midnight. That made troubleshooting difficult. The log file is now rolled when it reaches approximately 1 MiB. Ten compressed log files are kept. With this update the current log file typically captures several days and the compressed log files typically capture a few weeks at a modest cost of approximately 2 MiB of disk space.
1.1.8
March 17, 2021
  • Fix Fix a bug in Gremlin's argument parsing for the hostnames and ipaddresses arguments for network attacks.
1.1.7
March 12, 2021
  • Fix Improve command-line argument parsing by providing better error messages and catching more edge cases related to illegal inputs.
1.1.6
March 4, 2021
  • Fix Patch a vulnerability in a 3rd party library that posed a variety of memory corruption scenarios, most likely use-after-free.
  • Info Improve error messages among network attacks when an invalid network device is supplied. Error message now includes all valid devices.
  • Info Drop invalid targeting tags with a warning.
1.1.5
February 18, 2021
  • New The daemon version is included in the gremlin check report.
  • Fix Occasionally the Docker version was incorrectly parsed which would result in the classic driver being used for container attacks.
1.1.4
February 8, 2021
  • New Some agent API traffic is now consolidated into fewer requests.
1.1.3
January 27, 2021
  • New Some agent API traffic is now gzip-compressed, reducing network overhead on machines where Gremlin is installed.
1.1.2
January 12, 2021
  • Fix Patch a vulnerability in a 3rd party library that posed a potential buffer overflow scenario
  • Fix Patch a vulnerability in a 3rd party library that posed a potential scenario to operate on dangling memory references
1.1.1
December 11, 2020
  • New You can now specify the SSL_CERT_FILE variable via the config.yml file. See the advanced configuration page for details on how to use it.
1.1.0
December 7, 2020
  • Fix Gremlin now properly interprets escaped newline characters \n for values of the GREMLIN_SSL_CERT environment variable.
  • Info Gremlin now reports container and process data at a slower rate, down from every 5 seconds during active attacks (and every 10 seconds otherwise) to every 30 seconds. We've found that this data changes much less frequently than is justified for a 5-10 second interval. This should result in significantly reduced network overhead required to run Gremlin.
  • Info Updated dependencies
1.0.18
November 20, 2020
  • Fix The Gremlin agent now writes a message to daemon.log when attacks finish. This provides observers of this log with an approximation on when attacks have ended.
  • Info Updated dependencies
1.0.17
November 6, 2020
  • New Gremlin correctly reports Windows 2019 (and later)
  • Fix Gremlin can be removed if the kernel driver is stopped or removed by hand
On this page
Back to top