Stark & Wayne

Blog

You can become a superhero of automation and development by learning and practicing. This is our blog from our learnings and practice.

We are consultants and trainers in Cloud Foundry, devops automation and continous delivery. We have the best jobs in the world helping you have the best job in the world.

Our applications need access to secrets - passwords, tokens, special URLs. Platforms like Cloud Foundry and Heroku have made environment variables easy to use, and so we use them. Albeit they are typically not as…

Posted by:Dr Nic Williams

Read More →

What are GPG Tools? GPG, or GNU Privacy Guard, is a replacement for Symantec's PGP cryptographic software suite and allows users to encrypt sensitive information. Specifically, GPG Tools includes a utility that integrates with Apple…

Posted by:Quintessence Anx

Read More →

Locking down your BOSH VMs? Here's a handy guide for some options at your disposal for overriding the default password for BOSH's vcap user: Customize it in your manifest In each resource pool (or VM…

Posted by:Geoff Franks

Read More →

At Stark & Wayne, we love Concourse pipelines! We use them for testing/releasing CLI utilities, deploying Cloud Foundry apps, building docker images, creating and testing BOSH releases, and vetting changes to BOSH deployments in…

Posted by:Geoff Franks

Read More →

A few of our recent posts related to standing up BOSH deployments using Genesis have all revolved around needing Vault to store your credentials safely. The vault-boshrelease makes this fairly straightforward, but there's now a…

Posted by:Geoff Franks

Read More →

In this post, we're going to use Genesis to deploy Cloud Foundry. We will make use of some of Genesis's cool features to generate unique credentials for each deployment, and Vault to keep the credentials…

Posted by:Geoff Franks

Read More →

If you've ever deployed Cloud Foundry via BOSH, you know how complicated BOSH's deployment manifests can be - thousands of lines, many properties, many of which are repeated. This problem gets compounded when you start…

Posted by:Geoff Franks

Read More →

Often I find myself needing to repeatedly access a service that is password protected. A good example would be trying to curl an end point that is behind basic auth, another is dealing with projects…

Posted by:Bill Chapman

Read More →