Azure Kubernetes Services (AKS) is Microsoft’s managed kubernetes offering running on Azure.
Explore the robust capabilities of Microsoft Azure in our comprehensive guide to cloud computing services.
This article delves into Azure Kubernetes Services (AKS), Microsoft’s managed Kubernetes offering that enhances the scalability and efficiency of your applications.
Get started with a step-by-step setup guide and practical tips to maximize your cloud strategy with Azure.
Azure CLI
installed refer to the docs for installation az --version
kubectl
installed and in the path, refer to the docs for installation az aks install-cli
kubectl version
helm
package manager installed and the path, refer to the docs for installation helm version
az login
and follow the instructions. For alternative ways of logging in, refer to the Azure CLI’s official docsaz account set --subscription <subscriptionName or ID>
az account list -o table
and copy the name or ID of the subscription you want to use.az group create --name k8s-goat-eastus-rg --location eastus
eastus
but you can find the list of available regions by running az account list-locations -o table
az aks
referenceaz aks create --resource-group k8s-goat-eastus-rg --name k8s-goat-cluster --enable-managed-identity --node-count 2 --enable-addons monitoring --generate-ssh-keys
az aks get-credentials --resource-group k8s-goat-eastus-rg --name k8s-goat-cluster
kubectl cluster-info
.git clone https://github.com/madhuakula/kubernetes-goat.git
cd kubernetes-goat/
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…