bosh deployments --column=name
Using environment '172.30.0.11' as client 'ops_manager'
Name
pivotal-container-service-c1c2109e8bbeaacede93
service-instance_e284311e-f533-45b1-89cd-a35866a0c1ec
Export TKGI deployment manifest
bosh manifest -d pivotal-container-service-c1c2109e8bbeaacede93 > tkgi.yaml
Setup Bosh and credhub credentials
cat > bosh.env << EOF
export BOSH_CLIENT='ops_manager'
export BOSH_CLIENT_SECRET='zypfG-JORm_Kxc0nQaHCvhyrPO95NNvx'
export BOSH_CA_CERT=/var/tempest/workspaces/default/root_ca_certificate
export BOSH_ENVIRONMENT=172.30.0.11
EOF
cat > credhub.env << EOF
export CREDHUB_CLIENT=$BOSH_CLIENT
export CREDHUB_SECRET=$BOSH_CLIENT_SECRET
EOF
Download rotate_control_plane_certs script
Download the rotate_control_plane_certs.sh script attached to this KB and make it executable
chmod +x rotate_control_plane_certs.sh
List currently deployed certificates
./rotate_control_plane_certs.sh -a list_certificates -d pivotal-container-service-c1c2109e8bbeaacede93 &> list_certificates
Regenerate CA and leaf certificates
./rotate_control_plane_certs.sh -a regenerate_certificates -d pivotal-container-service-c1c2109e8bbeaacede93 &> regenerate_certificates.out
Deploy TKGI
This step will restart the TKGI API and DB processes and push new certificates to the VMs. TKGI control plane will be unavailable while the command below is running
bosh deploy -d pivotal-container-service-c1c2109e8bbeaacede93 tkgi.yaml
List currently deployed certificates
./rotate_control_plane_certs.sh -a list_certificates -d pivotal-container-service-c1c2109e8bbeaacede93 &> list_certificates_new