The PCF Operations Manager VM can be used as a jump box to access and inspect a PCF deployment infrastructure, given that it is usually deployed inside of the PCF infrastructure network along with the BOSH Director VM (see PCF Reference Architecture) and that it contains PCF and BOSH management tools pre-installed (e.g. uaac
and bosh 2.0
CLI's).
Establish an SSH session with the Operations Manager VM
A domain name/ip address and an ssh
password for the default ubuntu
user ID are configured to the Operations Manager VM during its deployment.
Using such information, establish an ssh
session with the Operations Manager VM:
ssh ubuntu@<ops-mgr-domain-or-ip-address>
Type in the ssh
password when prompted.
Once logged in, run the pre-packaged bosh
and uaac
CLI's.
Examples of common platform management tasks:
Once connected to the Ops Manager VM, you can use the BOSH 2 CLI to inspect the Bosh Director configuration.
Find the BOSH Director VM IP address
From the Operations Manager web interface, click on the Director tile > Status tab and then copy the IP address
of the Ops Manager Director
row.
Collect the Director credentials
From the Operations Manager web interface, click on the Director tile > Credentials tab > Director Credentials
(url https://<ops-mgr-domain>/api/v0/deployed/director/credentials/director_credentials
)
and then copy the value of the password
field.
Set an environment alias for the Director
bosh alias-env director -e <ip_address_from_step1> --ca-cert=/var/tempest/workspaces/default/root_ca_certificate
Login to the BOSH Director
bosh -e director login
Once prompted for Email()
, enter user name "director
"
Then, enter the password collected for step 2 above when prompted.
Once logged in, you can issue BOSH CLI commands targeting the director
alias or environment.
Examples:
bosh -e diretor vms # list all VMs of all deployments bosh -e director tasks # list all running tasks for the BOSH Director bosh -e director -d <deployment_name> ssh # ssh into a VM of a deployment
Operations Manager runs its own UAA server.
In certain cases, it is necessary to create client IDs or inspect the configuration of that server.
Here is how you would connect to it using uaac
CLI from the Operations Manager VM.
uaac target https://127.0.0.1/uaa --skip-ssl-validation uaac token owner get opsman <ops_manager_admin_userid> -s "" -p <ops_manager_admin_userid>
Once authenticated, you can then issue any uaac
command targetting that Operations Manager UAA.
Example:
uaac users
The BOSH Director VM runs its own UAA server.
In certain cases, it is necessary to create client IDs or inspect the configuration of that server.
Here is how you would connect to it using uaac
CLI from the Operations Manager VM.
Find the BOSH Director VM IP address
From the Operations Manager web interface, click on the Director tile > Status tab and then copy the IP address
of the Ops Manager Director
row.
Target the BOSH Director UAA server
uaac target https://<director_ip_address_from_step1>:8443 --ca-cert /var/tempest/workspaces/default/root_ca_certificate
Find the "UAA Login Client Credentials" password for the Director UAA
From the Operations Manager web interface, click on the Director tile > Credentials tab > "UAA Login Client Credentials", click on Link to Credential
and then copy the value of the password
field.
Find the "ssh ubuntu@<ops-mgr-domain-or-ip-address>
" password for the Director UAA
From the Operations Manager web interface, click on the Director tile > Credentials tab > "Uaa Admin User Credentials", click on Link to Credential
and then copy the value of the password
field.
Login and get a client token
uaac token owner get login -s <uaa_login_password_from_step3>
Once prompted for User name:
, enter admin
Then, once prompted for Password:
, enter the password retrieved in step 4.
Once authenticated, then you can issue any uaac
command targeting the BOSH Director UAA server.
uaac target uaa.<PAS-system-domain> --skip-ssl-validation uaac token client get admin # get secret from Ops Mngr>PAS tile>Credentials> UAA - Admin Client Credentials
Once authenticated, then you can issue any uaac
command targeting the PAS UAA server.
uaac target https://<PKS-uaa-url>:8443 --skip-ssl-validation
Get the PKS UAA url from Operations Manager web interface > PKS tile > Settings > UAA > UAA URL
uaac token client get admin
Once prompted, get the secret from Operations Manager web interface > PKS tile > Credentials > Uaa Admin Secret
(url https://<ops-mgr-domain>/api/v0/deployed/products/<pks-deployment-id>/credentials/.properties.uaa_admin_secret)
Once authenticated, you can then issue any uaac
command targeting the PKS UAA server.