An official website of the United States government US flag signifying that this is a United States federal government website

Rotating Secrets III - BOSH

Rotating Secrets III - BOSH


Rotating BOSH secrets are pretty straight forward and should be done first. There are known limitations of the BOSH agent when updating the main BOSH password for each deployment. Deployments of BOSH should be done serially due to the dependencies of where these BOSH directors are being deployed to. Please reference the 18F/cg-deploy-bosh repository along with the rest of this guide.

Agent limitations when updating BOSH

The following should be referenced throughout the various deployments. According to the BOSH development team, there is currently no way to update the BOSH password without recreating the virtual machines (VMs). This is easy enough to do with the BOSH CLI. It is a time-consuming process which recreates all of the VMs for a particular deployment. This is similar to how the platform updates during a Stemcell release, but because of the limitations of the BOSH agent, the only update that can be done on these machines are cloud-check recreations. Any other attempts to update VMs is denied with an error.

Recreating and cloud checking BOSH VMs

Create a jumpbox for the BOSH director you’d like to target. Once in the jumpbox, view the status of the currently deployed VMs.

bosh-cli vms

Any VMs with a status of failing need to be recreated in order to have access to the new BOSH credentials from the updated deployment.

bosh-cli cloud-check -d ${deployment_name}

This command will check all the VMs found in the ${deployment_name} and prompt you through the next steps. Select option 4 which will recreate and monitor the VMs as they each one spins up. Because these VMs are being recreated, this process can take a while. Monitor the recreation task and the platform for any issues.

You can attach and detach from BOSH tasks at any time by referencing the task ID.

bosh-cli tasks -a -r | head

Once you have a list of task IDs, you can launch into it by attaching to the task.

bosh-cli task ${task_id}

You can detach from the task without canceling it with Ctrl-C.

Coordinate & monitor deployments

There are two types of deployments that need to be coordinated here. All of the BOSH directors deploy using the previous BOSH director in the pipeline with the exception of the environment BOSH deployments (e.g. development, staging, production). The other type of dependency are deployments external to the deploy-bosh pipeline which use the BOSH credentials in either their secrets or credential files.

External deployments

There are various pipelines that require BOSH credentials which will immediately be out of date once the BOSH deployment it targets and cause deployment failures and potentially cause downtime. All pipelines depending on BOSH must be paused and updated before unpausing them again.

Finding deployments with BOSH dependencies

Create a jumpbox for each environment and run bosh-cli deployments to get a list of all the deployments that will require pausing in Concourse. This list can be cross-referenced with the following searchings on searches on GitHub for the BOSH_TARGET and BOSH_ENVIRONMENT with a YAML filetype to find all the different deployments

open \
  '' \
  '' \
  '' \

Once these pipelines are paused, update the values after all BOSH deployments have successfully deployed. Then unpause pipelines after you have successfully uploaded secrets or reflown pipelines.

BOSH deployments

There are five BOSH deployments which are used to deploy Master BOSH deploys Tooling BOSH which deploys Development, Staging, and Production BOSH. During a deployment of the BOSH director, BOSH will be unresponsive and will lead to errors in any deployments that interact with the director. Verify that these external deployments have been paused before proceeding with these steps.

Besides certificates, all secrets in each BOSH deployment can be generated and replaced or can be updated from rotated IAM users.

Deploying Master BOSH

Start with the Master bosh deployment and secrets. This will require that you create a new root CA certificate for this deployment and to sign certificates for subsequent BOSH deployments (e.g. Tooling, Development, Staging, Production).

In the cg-deploy-bosh repository, you will find a Create a ./tmp directory and run that script in there with the IP address for Master BOSH. The IP address can be found in the Terraform output for the Tooling environment as master_bosh_static_ip.

./ ${master_bosh_static_ip}

Once the certificates have been generated, update the values in the Master BOSH secrets. See the secret key management and substitute the file you’re downloading for the Master BOSH file found in the deploy-bosh pipeline.

The script will also upload a new key pair to AWS and output the name and fingerprint. Use the name as the value for aws.default_key_name in all bosh manifests.

Encrypting private key

Use the same secrets passphrase you generated for the encrypting both the secrets file and the private key. Encrypt and upload the private key using the same technique for secret key management.

INPUT_FILE=master-bosh.key \
OUTPUT_FILE=master-bosh.pem \
PASSPHRASE=${master_bosh_secrets_passphrase} \

Deploying Tooling BOSH

In the cg-deploy-bosh repository, you will find a Create a ./tmp directory and run that script in there with the IP address for Tooling BOSH. The IP address can be found in the Terraform output for the Tooling environment as tooling_bosh_static_ip.

./ Tooling ${tooling_bosh_static_ip}

Wait to deploy this BOSH until after Master BOSH deploys successfully and is validated.

Deploying other BOSH environments

These deployments are deployed with the Tooling BOSH director. In the cg-deploy-bosh repository, you will find a Create a ./tmp directory and run that script in there with the IP address for each BOSH (e.g. Development, Staging, Production). The IP addresses can be found in the Terraform output for each environment as bosh_static_ip.

./ Development ${development_bosh_static_ip}
./ Staging ${staging_bosh_static_ip}
./ Production ${production_bosh_static_ip}

Verify AWS key pair has been rotated for all VMS

After rotating all secrets and recreating the VMs, all bosh-managed instances should be using the new key pair generated by Verify this by running the following command. It will report any instances that are not using the key pair.

aws ec2 describe-instances --max-items 500 | jq '.Reservations[].Instances[] | select(.State.Name == "running") | select(.KeyName != "'${KEYNAME}'") | .InstanceId+" "+.KeyName'