Created
August 22, 2020 03:25
-
-
Save cappetta/69b7cffd6335e710688244776dcd1c8a to your computer and use it in GitHub Desktop.
CyberRange LifeCycle Test Using Command Center
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Test the Cyber Range LifeCycle using the CommandCenter docker container. | |
1. start the AWS Cyber Range CommandCenter docker container. Export your keys then run the container. | |
export aws_access_key_id=example_access_key_id | |
export aws_secret_access_key=example_secret_key | |
docker run -it -e AWS_ACCESS_KEY_ID=$aws_access_key_id -e AWS_SECRET_ACCESS_KEY=$aws_secret_access_key awscyberrange/commandcenter:latest /bin/bash | |
2. update the variables.tf and add your external IP address the ip is located in https://github.com/secdevops-cuse/CyberRange/tree/master/terraform/modules/infrastructure/secdevops/variables.tf#L1 (edited) | |
3. Perform the following steps | |
AWS_PROFILE=whatever ENV=YourTest REGION=us-east-1 make init | |
AWS_PROFILE=deprecaited ENV=test REGION=us-east-1 make network | |
AWS_PROFILE=deprecaited ENV=test REGION=us-east-1 make lab | |
AWS_PROFILE=deprecaited ENV=test REGION=us-east-1 make checkLab | |
AWS_PROFILE=deprecaited ENV=test REGION=us-east-1 make destroy-force |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Thanks for Sharing your notes!