Cyber security

AWS – Amazon Web Services

Elastic Kubernetes Service (EKS) is a managed kubernetes offering by AWS.

Discover how to harness the power of Amazon Web Services (AWS) to deploy a robust, scalable Kubernetes environment.

This tutorial guides you through setting up an EKS cluster, configuring essential tools like eksctl, kubectl, and awscli, and deploying the Kubernetes Goat for real-world application testing.

Perfect for beginners and experienced developers alike, dive into the essentials of AWS to enhance your cloud capabilities.

Prerequisites

Setup

  • Ensure you have your AWS profile configured. Run aws configure. Refer to the docs for configuration.
  • We will create a new EKS cluster k8s-goat-cluster with two nodes of type t4g.medium.
    • You can modify the command as you need, run eksctl create cluster --help to see all available options.
eksctl create cluster --name k8s-goat-cluster --region us-east-1 --node-type t4g.medium --nodes 2
  • Once the cluster is created, you can update your ~/.kube/config file with the following command,
aws eks update-kubeconfig --name k8s-goat-cluster --region us-east-1
  • Confirm that the cluster has been added to your config and the right context is set by running kubectl cluster-info.
  • Then clone the Kubernetes Goat repository locally by running the following command
git clone https://github.com/madhuakula/kubernetes-goat.git
  • Navigate to the folder for setup and installation of the Kubernetes Goat
cd kubernetes-goat/
  • Run the following script to set up and deploy the Kubernetes Goat resources into your cluster
bash setup-kubernetes-goat.sh
Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

vArmor : Enhancing Container Security In Cloud-Native Environments

vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers.…

1 day ago

DOLOST – Harnessing Cyber Deception For Strategic Security Deployments

Explore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool…

1 day ago

LDAP Firewall – Enhancing Security With Advanced Active Directory Protection

LDAP Firewall is an open-source tool for Windows servers that lets you audit and restrict incoming…

1 day ago

CVE-2024-36401 : GeoServer Unauthenticated Remote Code Execution In Evaluating Property Name Expressions

GeoServer is an open-source software server written in Java that provides the ability to view,…

1 day ago

BetterScan-CE Wiki : Integrating Comprehensive Security Scans Into DevOps

It is a Code and Infrastructure (IaC) and Cloud-native Scanning/SAST/Static Analysis/Linting solution using many tools/Scanners…

1 day ago

Betterscan – Comprehensive Security Orchestration For Code And Infrastructure

Scan your source code and infra IaC against top security risks Betterscan is a orchestration toolchain that…

2 days ago