You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: scenarios/UseIGOnAKS/use-ig-on-aks.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Before running any commands, ensure that your local environment is connected to
20
20
21
21
```bash
22
22
# Retrieve AKS cluster credentials:
23
-
az aks get-credentials --resource-group "myAKSResourceGroupabcf37" --name "myAKSClusterabcf37"
23
+
az aks get-credentials --resource-group $RESOURCE_GROUP --name $CLUSTER_NAME
24
24
```
25
25
26
26
After executing this command, `kubectl` will be configured to communicate with the specified AKS cluster.
@@ -190,4 +190,9 @@ In the final part of the script, the focus shifts to monitoring and alerting:
190
190
kubectl gadget undeploy
191
191
```
192
192
193
-
These steps ensure that your metrics are visually accessible via Grafana and that alerts are configured for proactive monitoring. The final undeploy command removes the deployed gadget from the cluster, wrapping up the execution workflow.
193
+
These steps ensure that your metrics are visually accessible via Grafana and that alerts are configured for proactive monitoring. The final undeploy command removes the deployed gadget from the cluster, wrapping up the execution workflow.
194
+
195
+
## Next Steps
196
+
-[Real-world scenarios where Inspektor Gadget can help you](https://go.microsoft.com/fwlink/p/?linkid=2260402#use-cases)
197
+
-[Explore the available gadgets](https://go.microsoft.com/fwlink/p/?linkid=2260070)
198
+
-[Run your own eBPF program](https://go.microsoft.com/fwlink/p/?linkid=2259865)
-**Azure subscription**: If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?ref=microsoft.com&utm_source=microsoft.com&utm_medium=docs&utm_campaign=visualstudio) before you begin.
29
+
-**Install Ansible**: Do one of the following options:
28
30
29
-
## 2. Create an SSH key pair
31
+
-[Install](/azure/ansible/ansible-install-configure#install-ansible-on-an-azure-linux-virtual-machine) and [configure](/azure/ansible/ansible-install-configure#create-azure-credentials) Ansible on a Linux virtual machine
1. Run the following command. When prompted, specify the files to be created in the following directory: `/home/azureuser/.ssh/authorized_keys`.
34
+
## Implement the Ansible playbook
32
35
33
-
```bash
34
-
ssh-keygen -m PEM -t rsa -b 4096
35
-
```
36
+
1. Create a directory in which to test and run the sample Ansible code and make it the current directory.
36
37
37
-
1. Copy the contents of the public key file. By default, the public key file is named `id_rsa.pub`. The value is a long string starting with "ssh-rsa ". You'll need this value in the next step.
38
-
39
-
## 3. Implement the Ansible playbook
38
+
2. Create a file named main.yml and insert the following code. In the playbook below the resource group name and other relevant properties use environment variables so that they are unique for each run.
40
39
41
-
1. Create a directory in which to test and run the sample Ansible code and make it the current directory.
1. Create a file named `main.yml` and insert the following code. Replace the `<key_data>` placeholder with the public key value from the previous step.
44
-
45
-
```yaml
46
-
- name: Create Azure VM
47
-
hosts: localhost
48
-
connection: local
49
-
tasks:
50
-
- name: Create resource group
51
-
azure_rm_resourcegroup:
52
-
name: myResourceGroup
53
-
location: eastus
54
-
- name: Create virtual network
55
-
azure_rm_virtualnetwork:
56
-
resource_group: myResourceGroup
57
-
name: myVnet
58
-
address_prefixes: "10.0.0.0/16"
59
-
- name: Add subnet
60
-
azure_rm_subnet:
61
-
resource_group: myResourceGroup
62
-
name: mySubnet
63
-
address_prefix: "10.0.1.0/24"
64
-
virtual_network: myVnet
65
-
- name: Create public IP address
66
-
azure_rm_publicipaddress:
67
-
resource_group: myResourceGroup
68
-
allocation_method: Static
69
-
name: myPublicIP
70
-
register: output_ip_address
71
-
- name: Public IP of VM
72
-
debug:
73
-
msg: "The public IP is {{ output_ip_address.state.ip_address }}."
74
-
- name: Create Network Security Group that allows SSH
Copy file name to clipboardExpand all lines: scenarios/metadata.json
+78Lines changed: 78 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1939,5 +1939,83 @@
1939
1939
}
1940
1940
]
1941
1941
}
1942
+
},
1943
+
{
1944
+
"status": "inactive",
1945
+
"key": "UseIGOnAKS/use-ig-on-aks.md",
1946
+
"title": "Comprehensive Guide to Using Inspektor Gadget in Kubernetes",
1947
+
"description": "This Exec Doc provides a detailed walkthrough of a shell script that demonstrates various operations with the Inspektor Gadget in a Kubernetes environment. It explains each functional block, how the gadget plugin is installed, deployed, and used to run examples, export metrics, and verify configurations.",
"title": "Quickstart: Create an Azure IoT Edge Device on Linux",
1987
+
"description": "Learn to configure an Azure IoT Edge device on Linux. This guide walks you through creating an IoT Hub, registering a device, and deploying a simulated sensor module.",
0 commit comments