Back to All Scenarios
PASSEDcloud / aws_dynamodb

AWS: DynamoDB Throttling — Provisioned Capacity Exceeded

A DynamoDB table is being throttled because read capacity is set too low for a traffic spike. ProvisionedThroughputExceededException on 40% of reads.

Pattern
AWS_CLOUD
Expected: AWS_DYNAMODB_THROTTLE
Severity
HIGH
Confidence
68%
Remediation
Auto-Heal

Test Results

MetricExpectedActualResult
Pattern RecognitionAWS_DYNAMODB_THROTTLEAWS_CLOUD
Severity AssessmentHIGHHIGH
Incident CorrelationN/ANone
Cascade EscalationN/ANo
RemediationAuto-Heal — Corax resolves autonomously

Scenario Conditions

AWS DynamoDB table 'user-sessions'. Provisioned: 100 RCU. Actual: 500 RCU needed. Auto-scaling lag. 40% of reads throttled.

Injected Error Messages (1)

AWS DynamoDB throttled — table 'user-sessions' ProvisionedThroughputExceededException on 40% of reads, provisioned 100 RCU but need 500, auto-scaling not triggered fast enough

Neural Engine Root Cause Analysis

AWS cloud infrastructure event detected — an EC2 instance may be unreachable or in a stopped state, an RDS database is experiencing issues, a load balancer has unhealthy targets, or a Lambda function is failing. AWS service disruptions can cascade across dependent resources and affect application availability.

Remediation Plan

1. Check the AWS Health Dashboard and Personal Health Dashboard for any active service events. 2. For EC2 issues, check instance status checks (system and instance), review CloudWatch metrics, and check VPC security group rules. 3. For RDS, verify database instance status, check storage and connection limits, and review slow query logs. 4. For ELB issues, check target group health checks and verify backend instances are responding. 5. For Lambda, review CloudWatch Logs for invocation errors and check IAM permissions and VPC connectivity.

Improvements Applied

  • Pattern classified as AWS_CLOUD (expected AWS_DYNAMODB_THROTTLE)
Tested: 2026-04-02Monitors: 1 | Incidents: 1Test ID: cmnhnr8vc09c1lig7a3dn12h3