Setting Up Your Jumpbox for BBR
Page last updated:
This topic describes how to set up your jumpbox for BOSH Backup and Restore (BBR).
To use BBR to back up and restore your Pivotal Cloud Foundry (PCF) deployment, you must first set up a jumpbox to run BBR from. The Ops Manager VM may be suitable.
Configure your jumpbox with the following settings:
- Your jumpbox must have sufficient space for the backup. A PCF backup requires at least 1.5 GB.
- Because BBR connects to the virtual machines (VMs) in your PCF deployment on their private IP addresses, your jumpbox must exist on the same network as the VMs. BBR does not support SSH gateways.
- Because BBR copies the backed-up data from the VMs to the jumpbox, you should have minimal network latency between them to reduce transfer times.
Consult the following table for more information about the network access permissions required by BBR.
|BOSH Director||25555||BBR interacts with the BOSH Director API.|
|Deployed Instances||22||BBR uses SSH to orchestrate the backup on the instances.|
|BOSH Director UAA||8443||BBR interacts with the UAA API for authentication, if necessary.|
Transfer the BBR binary to your jumpbox:
Download the latest BOSH Backup and Restore release from Pivotal Network.
On a command line, use
chmodto make the file executable. Replace
PATH-TO-BBR-FILEwith the local path to the BBR file.
$ chmod a+x PATH-TO-BBR-FILE
rsyncto securely copy the BBR binary to your jumpbox:
$ rsync -Pv -e "ssh -i LOCAL-PATH-TO-JUMPBOX-PRIVATE-KEY" LOCAL-PATH-TO-BACKUP-ARTIFACT JUMPBOX-USER@JUMPBOX-ADDRESS:
If the certificate chain on your local machine cannot verify the Certificate Authority (CA) certificate for the BOSH Director, you must have the path to the root CA certificate to run BBR commands.
If you have configured the Ops Manager VM as your jumpbox, the path to the root CA certificate is
If you have configured another machine as your jumpbox, use the Ops Manager API to download the CA certificate. See the Using the Ops Manager API topic to obtain a
UAA-ACCESS-TOKEN using the UAA CLI.
$ curl -k "https://$OPSMAN-IP/api/v0/security/root_ca_certificate" \ -H "Authorization: Bearer $UAA-ACCESS-TOKEN" \ | jq --raw-output '.root_ca_certificate_pem' > PATH-TO-BOSH-SERVER-CERTIFICATE
The open source
jq utility is available to download.