It is not a good idea to allow your BOSH/CredHub/Vault to be accessible on the public internet. Yes, they both require credentials and certificates to access, but there is just no good reason to expose them on the internet. So you will only deploy them into private networks.
Unfortunately, now you've made it hard for yourself to access them from the Internet.
Fortunately, you can make this problem almost invisible to yourself thru the wonders of SOCKS5 proxies and the ever handy
ssh tool. In this article we'll create a magical tunnel from your laptop into your private BOSH and its deployments thru a public jumpbox/bastion.
I'll assume you have a minimum of two subnets: one publicly accessible via the Internet (called the DMZ, or Demilitarised Zone), and the other that is not (called the private subnet). I'll assume your BOSH and all its deployments are in the private subnet.
The first step to using magical SOCKS5 tunnels is to run a jumpbox/bastion VM in the DMZ. You and your team will have SSH access to this jumpbox. If you're running Pivotal Cloud Foundry then you can use your Ops Manager. If you don't already have a jumpbox, or a wrestling with how to manage a long-lived jumpbox and its persistent data, allow me to point you to https://github.com/cppforlife/jumpbox-deployment.
Next, in a terminal window you run
ssh with the
ssh -D 9999 allocates a socket to listen to port 9999 on your local machine. Connections to it are forwarded based on the SOCKS5 application protocol. In lieu of further explanation, I'll resume using the terminology "magic tunnel".
ssh -N flag allows you to run
ssh without a command or terminal prompt.
For example, to open a SOCKS5 magic tunnel you might run:
ssh -N -D 9999 jumpbox@jumpbox-ip -i path/to/jumpbox.pem
The final step is for your local applications to know how to use a SOCKS5 tunnel. Not all applications do. Fortunately
credhub CLIs can use a SOCKS5 tunnel if they discover specific environment variables.
bosh to connect to our magic tunnel on local port 9999:
credhub to connect to our magic tunnel:
To configure the Vault CLI
safe to connect to the magic tunnel:
And you're done.*
You can now target your BOSH director or any CredHub API with the IP address as if you had direct access from your local machine. The
credhub CLIs will do all the work to use the magic tunnel to make it work.
All is not perfect. At the time of writing,
credhub CLIs get quite cranky if
$HTTPS_PROXY is also set. I've raised issues for both:
Thanks to James Hunt for guiding me to the Dinosaur Train magic tunnel image. May small children forever have fun TV to watch.