Deploying offending workloads
To trigger recommendations and threat alerts in Azure Security Center, you will need to have offending workloads deployed on your cluster. In this section, you will deploy a number of workloads to your cluster that are either not configured according to best practices or even contain potentially malicious software such as crypto-miners. Let's have a look at the examples of offending workloads you can find in the code samples for this chapter:
crypto-miner.yaml
: This file contains a deployment that will create a crypto-miner on your cluster.1Â Â Â apiVersion: apps/v1 2Â Â Â kind: Deployment 3Â Â Â metadata: 4Â Â Â Â Â name: crypto-miner 5Â Â Â Â Â labels: 6Â Â Â Â Â Â Â app: mining 7Â Â Â spec: 8Â Â Â Â Â replicas: 1 9Â Â Â Â Â selector: 10Â Â Â Â Â Â matchLabels...