Cyber security

AWS – Amazon Web Services

Elastic Kubernetes Service (EKS) is a managed kubernetes offering by AWS.

Discover how to harness the power of Amazon Web Services (AWS) to deploy a robust, scalable Kubernetes environment.

This tutorial guides you through setting up an EKS cluster, configuring essential tools like eksctl, kubectl, and awscli, and deploying the Kubernetes Goat for real-world application testing.

Perfect for beginners and experienced developers alike, dive into the essentials of AWS to enhance your cloud capabilities.

Prerequisites

Setup

  • Ensure you have your AWS profile configured. Run aws configure. Refer to the docs for configuration.
  • We will create a new EKS cluster k8s-goat-cluster with two nodes of type t4g.medium.
    • You can modify the command as you need, run eksctl create cluster --help to see all available options.
eksctl create cluster --name k8s-goat-cluster --region us-east-1 --node-type t4g.medium --nodes 2
  • Once the cluster is created, you can update your ~/.kube/config file with the following command,
aws eks update-kubeconfig --name k8s-goat-cluster --region us-east-1
  • Confirm that the cluster has been added to your config and the right context is set by running kubectl cluster-info.
  • Then clone the Kubernetes Goat repository locally by running the following command
git clone https://github.com/madhuakula/kubernetes-goat.git
  • Navigate to the folder for setup and installation of the Kubernetes Goat
cd kubernetes-goat/
  • Run the following script to set up and deploy the Kubernetes Goat resources into your cluster
bash setup-kubernetes-goat.sh
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

11 hours ago

ROADTools: The Modern Azure AD Exploration Framework

ROADTools is a powerful framework designed for exploring and interacting with Microsoft Azure Active Directory…

4 days ago

How to Enumerate Microsoft 365 Groups Using PowerShell and Python

Microsoft 365 Groups (also known as M365 Groups or Unified Groups) are at the heart…

4 days ago

SeamlessPass: Using Kerberos Tickets to Access Microsoft 365

SeamlessPass is a specialized tool designed to leverage on-premises Active Directory Kerberos tickets to obtain…

5 days ago

PPLBlade: Advanced Memory Dumping and Obfuscation Tool

PPLBlade is a powerful Protected Process Dumper designed to capture memory from target processes, hide…

5 days ago

HikPwn : Simple Scanner For Hikvision Devices With Basic Vulnerability Scanning

HikPwn: Comprehensive Guide to Scanning Hikvision Devices for Vulnerabilities If you’re searching for an efficient…

6 days ago