Infrastructure Scenario Tests

We test Corax against real-world infrastructure failures across every vendor, platform, and scenario. Browse the results below.

276
Total Tests
100.0%
Pass Rate
276
Passed
0
Failed

Disk Full — Log Files Filling Production Database Server

PASS

The database server's data partition fills to 100% due to an unrotated slow query log. PostgreSQL can no longer write WAL files. All database writes fail. Application is read-only.

ServerPattern: DISK_FULLSeverity: CRITICALConfidence: 95%Remote Hands29 correlated

CPU Exhaustion — Crypto Mining Malware on Web Server

PASS

A web server is compromised via an unpatched vulnerability. Crypto mining malware is consuming 100% CPU across all cores, making the web application unresponsive for legitimate users.

ServerPattern: HIGH_CPUSeverity: CRITICALConfidence: 95%Auto-Heal8 correlated

Memory Exhaustion — Java Heap OOM on Production App Server

PASS

A production Java application server runs out of heap memory due to a memory leak in a recent deployment. The OOM killer terminates the JVM process, bringing down the application for all users.

ServerPattern: MEMORY_EXHAUSTIONSeverity: CRITICALConfidence: 92%Auto-Heal18 correlated

UniFi AP Mass Isolation After Controller Update

PASS

A UniFi controller update introduces a bug that causes all APs to lose their management connection. APs continue serving clients with last-known config, but cannot be managed, updated, or monitored.

VendorPattern: UBIQUITI_EVENTSeverity: CRITICALConfidence: 85%Remote Hands22 correlated

MPLS PE-CE Link Failure Isolating Branch Office

PASS

The MPLS PE-CE link at a remote branch office fails. The branch is completely isolated from the WAN. No backup link exists. 30 employees cannot access any corporate resources.

VendorPattern: MPLS_EVENTSeverity: CRITICALConfidence: 85%Remote Hands26 correlated

SD-WAN Path Failover — Primary ISP Down

PASS

The primary MPLS circuit at a branch office goes down. SD-WAN fails over to the backup broadband link. Voice quality degrades due to higher jitter on the broadband path.

VendorPattern: SDWAN_EVENTSeverity: CRITICALConfidence: 85%Remote Hands36 correlated

Nutanix CVM Crash — Node Storage Offline

PASS

A Nutanix Controller VM (CVM) crashes on one node of a 4-node cluster. All VMs on that node lose local storage access. The cluster attempts to serve I/O from surviving CVMs but performance degrades significantly.

VendorPattern: NUTANIX_EVENTSeverity: CRITICALConfidence: 85%Remote Hands36 correlated

Cisco Port Security Violation — MAC Spoofing

PASS

An attacker spoofs a MAC address to bypass network access control. Port security detects the violation and shuts down the port, but not before the attacker exfiltrates data for 30 seconds.

VendorPattern: CISCO_EVENTSeverity: CRITICALConfidence: 95%Remote Hands9 correlated

OSPF Adjacency Loss Between Core Routers

PASS

An OSPF adjacency between two core routers drops due to a unidirectional fiber failure. Routes are withdrawn, causing a major routing blackhole for half the campus network.

VendorPattern: CISCO_EVENTSeverity: CRITICALConfidence: 85%Remote Hands31 correlated

FortiGate UTM Blocking Critical SaaS Application

PASS

A FortiGuard web filter update incorrectly categorizes a critical SaaS application as malware. All employee access to the application is blocked by the UTM policy.

VendorPattern: FORTINET_EVENTSeverity: CRITICALConfidence: 95%Remote Hands20 correlated

FortiGate HA Cluster Failover

PASS

The primary FortiGate in an HA pair crashes due to a firmware bug, triggering failover to the secondary unit. All active VPN tunnels drop and need to re-establish.

VendorPattern: FORTINET_EVENTSeverity: CRITICALConfidence: 85%Remote Hands37 correlated

ARP Storm from IP Conflict

PASS

Two devices on the same VLAN have been assigned the same IP address. Both are sending gratuitous ARPs, creating an ARP storm that degrades network performance for the entire subnet.

NetworkPattern: ARP_STORMSeverity: CRITICALConfidence: 88%Remote Hands23 correlated

MAC Flood Attack on Access Switch

PASS

A compromised workstation is flooding the network with spoofed MAC addresses, overflowing the switch CAM table and causing unknown unicast flooding across all VLANs.

NetworkPattern: MAC_TABLE_OVERFLOWSeverity: CRITICALConfidence: 90%Auto-Heal22 correlated

Uplink Port Flapping Between Distribution Switches

PASS

A fiber SFP is failing on the uplink between access and distribution layer switches. The port flaps every 30-90 seconds, causing MAC table instability and intermittent connectivity for 200+ users.

NetworkPattern: PORT_FLAPPINGSeverity: CRITICALConfidence: 85%Remote Hands48 correlated

Spanning Tree Loop — BPDU Guard Violation

PASS

A user plugs a personal switch into an access port configured with BPDU Guard. The switch sends BPDUs, triggering err-disable on the port and a topology change notification across the network.

NetworkPattern: STP_LOOPSeverity: CRITICALConfidence: 92%Remote Hands48 correlated

Broadcast Storm from Rogue Switch

PASS

An employee connects an unmanaged switch creating a Layer 2 loop. No spanning tree on the VLAN. Broadcast storm takes down all services on VLAN 10.

NetworkPattern: BROADCAST_STORMSeverity: CRITICALConfidence: 92%Remote Hands60 correlated
PreviousPage 14 of 14

Every scenario is tested against Corax's Neural Engine in a production environment with AI-powered root cause analysis.

Tests run continuously as new infrastructure patterns are added.