Cyber security

AWS – Amazon Web Services

Elastic Kubernetes Service (EKS) is a managed kubernetes offering by AWS.

Discover how to harness the power of Amazon Web Services (AWS) to deploy a robust, scalable Kubernetes environment.

This tutorial guides you through setting up an EKS cluster, configuring essential tools like eksctl, kubectl, and awscli, and deploying the Kubernetes Goat for real-world application testing.

Perfect for beginners and experienced developers alike, dive into the essentials of AWS to enhance your cloud capabilities.

Prerequisites

Setup

  • Ensure you have your AWS profile configured. Run aws configure. Refer to the docs for configuration.
  • We will create a new EKS cluster k8s-goat-cluster with two nodes of type t4g.medium.
    • You can modify the command as you need, run eksctl create cluster --help to see all available options.
eksctl create cluster --name k8s-goat-cluster --region us-east-1 --node-type t4g.medium --nodes 2
  • Once the cluster is created, you can update your ~/.kube/config file with the following command,
aws eks update-kubeconfig --name k8s-goat-cluster --region us-east-1
  • Confirm that the cluster has been added to your config and the right context is set by running kubectl cluster-info.
  • Then clone the Kubernetes Goat repository locally by running the following command
git clone https://github.com/madhuakula/kubernetes-goat.git
  • Navigate to the folder for setup and installation of the Kubernetes Goat
cd kubernetes-goat/
  • Run the following script to set up and deploy the Kubernetes Goat resources into your cluster
bash setup-kubernetes-goat.sh
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

1 day ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

1 day ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

2 days ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

4 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

4 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

4 days ago