A stemcell is a versioned Operating System image wrapped with IaaS specific packaging.

Typical stemcell contains bare minimum OS skeleton with few common utilities pre-installed, a BOSH Agent and few configuration files to make OS be securely configured by default.

Learn more about stemcells.

Ubuntu Lucid, CentOS 6.x, and Ruby agent based stemcells are deprecated.

Upload latest version to your BOSH Director:

# Upload latest version, currently 3421
$ bosh upload stemcell https://bosh.io/d/stemcells/bosh-vcloud-esxi-ubuntu-trusty-go_agent

# Upload specific version
$ bosh upload stemcell https://bosh.io/d/stemcells/bosh-vcloud-esxi-ubuntu-trusty-go_agent?v=3421

Alternatively, download stemcell tarball locally:

# ...or download it directly using curl
$ curl -L -J -O https://bosh.io/d/stemcells/bosh-vcloud-esxi-ubuntu-trusty-go_agent?v=3421

# or with wget...
$ wget --content-disposition https://bosh.io/d/stemcells/bosh-vcloud-esxi-ubuntu-trusty-go_agent?v=3421
  • Ubuntu Trusty

    • vCloud ESXi 426MB
      2017-05-23T00:37:03.000Z 06590483278f9766d7fcaa140c2b8c1d825b334b [SHA1]
    • vCloud ESXi 426MB
      2017-05-19T23:43:32.000Z 5489d78a209f5cba1e5ba836cf270c7528a690a2 [SHA1]
      • Periodic Ubuntu stemcells update
    • vCloud ESXi 426MB
      2017-05-12T19:29:02.000Z 3aa176c30d4b9d9ac62d3a248e586ac7d89c2760 [SHA1]
      • Periodic Ubuntu stemcells update
      • Run cron in BOSH Lite stemcells so that logrotation is performed
    • vCloud ESXi 426MB
      2017-04-25T23:14:30.000Z b523ac020f210fab25e4b215e1d5c50d619b541b [SHA1]
      • Bump Ubuntu stemcells for USN-3265-2: Linux kernel (Xenial HWE) vulnerabilities
    • vCloud ESXi 426MB
      2017-04-17T22:49:26.000Z dc8e467a01a9c931048219ca764c2702467cc8ba [SHA1]
      • Periodic bump for CentOS stemcells to include CESA-2017:0933
      • Disable IPv6 through /proc/cmdline to eliminate possibilty of listening on tcp6/udp6
    • vCloud ESXi 426MB
      2017-04-05T21:56:14.000Z 8dbe40b4267c294e29ce17c6621a1ed43a0b24f7 [SHA1]
      • Bump Ubuntu stemcells for USN-3256-2: Linux kernel (HWE) vulnerability

      Misc:

      • Made AWS AMI backing snapshot public to support encryption of boot disks
    • vCloud ESXi 426MB
      2017-03-30T21:29:02.000Z de1dcf6b5342c7272752aacc36c20d48048334bc [SHA1]
      • Bump Ubuntu stemcells for USN-3249-2: Linux kernel (Xenial HWE) vulnerability
    • vCloud ESXi 426MB
      2017-03-10T00:56:59.000Z 5ec32251d1ac97d5e1e99458b9deea422240da79 [SHA1]
    • vCloud ESXi 426MB
      2017-03-08T23:51:45.000Z 1872a80d33cc38d9b03254fed77c23e94c920d36 [SHA1]
      • Bumps Ubuntu stemcells for USN-3220-2: Linux kernel (Xenial HWE) vulnerability
    • vCloud ESXi 426MB
      2017-02-23T02:27:55.000Z 9b0fa9b7debe38a52fd348170cad8c3d38e1f319 [SHA1]

      Changes: - Bumps Ubuntu stemcells for USN-3208-2: Linux kernel (Xenial HWE) vulnerabilities - Fixes excessive “out of memory” errors in kernel - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1655842 - Fixes regression to rsyslog by locking it down again to rsyslog 8.22.0

      Agent: - Fixes Azure stemcell persistent disk formatting - Fixes Warden stemcells SSH access

    • vCloud ESXi 426MB
      2017-02-17T21:16:21.000Z 1614096b91bcf3ae41aa17cf7f7930fb586cf413 [SHA1]

      Reported Problems: - DO NOT USE azure stemcell as it may cause data loss. - rsyslog version updated to 8.24.0, regressing on issue #1537 - Out of memory errors still exists in Kernel 4.4.0.62 - will be fixed around Feb 20.

      Changes: - Fixes double -hvm- suffix problem for AWS Light stemcells

    • vCloud ESXi 426MB
      2017-02-16T02:18:53.000Z f1e1cf8613140184b73c3cbebd64b3aceeddbb72 [SHA1]

      Reported Problems: - DO NOT USE azure stemcell as it may cause data loss. - Out of memory errors still exists in Kernel 4.4.0.62 - will be fixed around Feb 20. - rsyslog version updated to 8.24.0, regressing on issue #1537 - AWS Light stemcell has incorrect name once imported - BOSH SSH does not work on BOSH Lite

      Changes: - Add more auditd rules - Fix CentOS initramfs to load necessary kernel modules - Disable boot loader login - Increasing tcp_max_sync_backlog - Disabling any DSA host keys - Add bosh_sshers group and assign it to vcap user - Only allow users in bosh_sshers group to SSH

      Agent: - Log Agent API access events in CEF format to syslog (vcap.agent topic) - Allow configuring swap size through env.bosh.swap_size (example: env.bosh.swap_size: 0) - Prepare for SHA2 releases - Allow setting fetching to work with base64 encoded user data - Do not delaycompress in logrotate

    • vCloud ESXi 426MB
      2017-05-19T16:29:30.000Z 2ded934b470415b73a4d40737a9ab332a8bb39a7 [SHA1]
    • vCloud ESXi 426MB
      2017-04-25T23:17:46.000Z 395d6dd5b96415b1f3da7788120d4dc8d8c5bb8b [SHA1]
    • vCloud ESXi 426MB
      2017-04-05T23:49:36.000Z 66c48b9cc02fb582a01463851448755ae7c412bd [SHA1]
    • vCloud ESXi 426MB
      2017-03-30T23:19:01.000Z 420ad748e2127916338f7271066411f2435942a2 [SHA1]
    • vCloud ESXi 426MB
      2017-03-08T23:52:01.000Z 765c8f586240ee913e5a43600cc0d318f061a754 [SHA1]
    • vCloud ESXi 426MB
      2017-02-23T01:54:36.000Z 23be23c7e76da9aa6db24977458d7cd2e6c19ff7 [SHA1]
    • vCloud ESXi 426MB
      2017-02-10T00:59:04.000Z baafcb05a0307b1ee2b3dad4fdbb0bbe48aa5d1a [SHA1]
    • vCloud ESXi 425MB
      2016-12-14T02:47:55.000Z 81e6c779003866ad26dcd78d850198e4e4aa984d [SHA1]
      • Bumps Ubuntu stemcells for USN-3156-1: APT vulnerability
    • vCloud ESXi 425MB
      2016-12-05T17:32:02.000Z a90eb70ec67f3584998d88023142c7269314a783 [SHA1]
      • Periodic stemcell update
    • vCloud ESXi 425MB
      2016-12-02T16:33:42.000Z 3f07f3bd27c7ede51e330b3ef51f4b44a7dad3c6 [SHA1]
    • vCloud ESXi 425MB
      2016-11-30T04:51:55.000Z 165d53eaf40cab3a1b062ba740f7b66631b8c9d0 [SHA1]
      • Periodic stemcell update
        • Includes USN-3134-1 as requested by a community member
    • vCloud ESXi 425MB
      2016-11-16T22:14:40.000Z 459fc0f97d721b0c3f5fdcb949c4369b6a871d4f [SHA1]
      • Properly includes libpam_cracklib.so to avoid errors in /var/log/auth.log
    • vCloud ESXi 424MB
      2016-11-10T23:56:00.000Z a7c0e056a3f8fab76820bcfa34a67ea3d5e275f6 [SHA1]
      • Fixes persistent disk mounting on OpenStack described in Stemcell 3308
    • vCloud ESXi 424MB
      2016-11-10T03:53:36.000Z 28bfe6d68aa2534664e31d95d4644cd477707e9b [SHA1]

      Reported Problems: - On OpenStack: Mounting persistent disks not working when using config-drive: disk while nova is configured to use a cdrom config-drive due to https://github.com/cloudfoundry/bosh/issues/1503

      Fixes: - Fixes SSH key installation issue introduced in Stemcell 3306

    • vCloud ESXi 424MB
      2016-11-08T17:25:08.000Z dd4e1c653dec3f73a9a58042933ad677ce59a850 [SHA1]

      Reported Problems - bosh-init doesn’t work with this stemcell on OpenStack and AWS due to https://github.com/cloudfoundry/bosh/issues/1500 - Booting the stemcell image directly in you IaaS (without using BOSH/bosh-init) does no longer provision the ssh key for user vcap, so you need to login differently

      Changes - Agent will now wait for monit to complete stop all processes before carrying on - Added google stemcells - Default dmesg_restrict to 1 - Disable all IPv6 configurations - Reenabled UDF kernel module for Azure - Increase root_maxkeys and maxkeys kernel configurations - Changed default hostname to bosh-stemcell instead of localhost to avoid boot problems on GCP - Lower TCP keepalive configuration by default - Mount /var/log directory to /var/vcap/data/root_log - Restrict Access to the su command - Add pam_cracklib requirements to common-password and password-auth - Enable auditing for processes that start prior to auditd - Set log rotation interval to 15 min in stemcell - Made ownership & permissions for /etc/cron* files more restrictive - Customize shell prompt to show instance name and ID - Removed floppy drives from vSphere stemcells - Removed bosh micro assets hence making bosh micro unsupported

      Misc: - Stemcells are now built through Concourse via https://main.bosh-ci.cf-app.com/teams/main/pipelines/bosh:stemcells

    • vCloud ESXi 552MB
      2017-05-19T16:25:26.000Z 49c1268ea58c3b1cccf4a7867c1297d524219a41 [SHA1]
    • vCloud ESXi 552MB
      2017-04-25T23:28:46.000Z 42bde8e006d12f3fbabdc1270376881de74b018a [SHA1]
    • vCloud ESXi 552MB
      2017-04-06T00:47:38.000Z 9a2a4cb9ba6c789a387846284a9c5c6b9fd27233 [SHA1]
    • vCloud ESXi 552MB
      2017-03-31T00:52:19.000Z 6df9859c86365b8b1d750c5a3dcdbed5918d5fc9 [SHA1]
    • vCloud ESXi 552MB
      2017-03-09T00:18:27.000Z 5acfccfa29dc03b050549508d3af761b59c0c2c6 [SHA1]
    • vCloud ESXi 552MB
      2017-02-23T00:59:19.000Z 882012b23164cd614e0ea55e59082ea75f1f4c41 [SHA1]
    • vCloud ESXi 551MB
      2017-01-13T04:36:13.000Z d34892e8d0a10002f537b5a08ecb49dcdf76b973 [SHA1]
    • vCloud ESXi 551MB
      2016-12-31T07:13:23.000Z 51207468117681ccdfb07e4b09e00e470239ca13 [SHA1]