Keybase proof
I hereby claim:
- I am honnuanand on github.
- I am honnuanand77 (https://keybase.io/honnuanand77) on keybase.
- I have a public key ASA2gr3_LG3mAFmz5i54_kNCmRCLMaJvEtE5rAP2jmUHCAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
imageCredentials: | |
registry: dev.registry.pivotal.io/container-services-manager | |
username: "arao@pivotal.io" | |
password: SNIP | |
broker: | |
image: | |
repository: dev.registry.pivotal.io/container-services-manager/broker | |
# pullPolicy: Always | |
replicaCount: 2 |
I hereby claim:
To claim this, I am signing this object:
bosh create-env bosh-deployment/bosh.yml \ | |
--state=state.json \ | |
--vars-store=creds.yml \ | |
-o bosh-deployment/vsphere/cpi.yml \ | |
-o bosh-deployment/misc/dns.yml \ | |
-v director_name=home \ | |
-v internal_cidr=10.0.13.0/24 \ | |
-v internal_gw=10.0.13.1 \ | |
-v internal_ip=10.0.13.10 \ | |
-v internal_dns='10.0.13.1' \ |
anandrao at Anands-MBP in ~/pivotal/repos/bosh-vmw | |
$ export BOSH_CLIENT=admin | |
export BOSH_CLIENT_SECRET=`bosh int ./creds.yml --path /admin_password` | |
export BOSH_CA_CERT=`bosh int ./creds.yml --path /default_ca/certificate` | |
anandrao at Anands-MBP in ~/pivotal/repos/bosh-vmw | |
$ bosh env | |
Using environment 'https://10.0.13.10:25555' as client 'admin' | |
Name home |
anandrao at Anands-MBP in ~/pivotal/repos/bosh-vmw/concourse/concourse-bosh-deployment/cluster (master●) | |
$ bosh update-cloud-config ../../../cloud-config-dan-h.yml | |
Using environment 'https://10.0.13.10:25555' as client 'admin' | |
+ azs: | |
+ - cloud_properties: | |
+ datacenters: | |
+ - clusters: | |
+ - Cluster-1: | |
+ resource_pool: RP-BBL |
anandrao at Anands-MBP in ~/pivotal/repos/bosh-vmw/concourse/concourse-bosh-deployment/cluster (master●) | |
$ bosh deploy -d concourse concourse.yml \ | |
-l ../versions.yml \ | |
--vars-store cluster-creds.yml \ | |
-o operations/basic-auth.yml \ | |
-o operations/privileged-http.yml \ | |
-o operations/privileged-https.yml \ | |
-o operations/tls.yml \ | |
-o operations/tls-vars.yml \ | |
--var network_name=default \ |
# Whether to allow SSH access to application instances | |
allow_app_ssh_access: true | |
# Change to anything other than 'wipe' to bypass the wipe-env job | |
arg_wipe: wipe | |
authentication_mode: internal | |
# If the azure_storage_account_name is empty "", ERT will use internal storage. If you want ERT to use Azure blob store, provide a valid storage account name. | |
azure_storage_account_name: CHANGEME #<--- This has to be created manually. Please see instructions on the blog |
anand@Azure:~$ #### Create Resource Group ##### | |
anand@Azure:~$ az group create --name "araoc2sterraform" --location "WestUS" | |
{ | |
"id": "/subscriptions/1da11b37-d598-4c13-8523-690756fd00ab/resourceGroups/araoc2sterraform", | |
"location": "westus", | |
"managedBy": null, | |
"name": "araoc2sterraform", | |
"properties": { |
anandrao at Anands-MBP in ~/pivotal/repos/bbl-az/concourse/concourse-bosh-deployment/cluster (master) | |
$ bosh upload-stemcell --sha1 1d660dcbb51a1c80914fbb8c11173e640014f6c5 \ | |
https://bosh.io/d/stemcells/bosh-azure-hyperv-ubuntu-xenial-go_agent\?v\=97.3 | |
Using environment 'https://10.0.0.6:25555' as client 'admin' | |
Task 9 | |
Task 9 | 07:09:48 | Update stemcell: Downloading remote stemcell (00:00:15) | |
Task 9 | 07:10:03 | Update stemcell: Verifying remote stemcell (00:00:02) | |
Task 9 | 07:10:05 | Update stemcell: Extracting stemcell archive (00:00:04) |