Skip to content

Tutorials

Tutorials walk through concrete operational scenarios step by step. Each one starts with a specific situation, explains what is happening under the hood, and ends with the stack and all agents back in a known-good state.

All tutorials assume a running Finch stack and at least one enrolled agent. If you have not yet deployed a stack, start with Deploy the Stack.


Recover an Agent Breach

An agent's JWT or configuration file was exposed. The agent must be deregistered immediately to revoke the token, then re-enrolled with a fresh credential.

Covers: agent deregister · agent register · optional full teardown · agent deploy


Rotate mTLS Certificates

The mTLS client certificate issued when the stack was deployed expires after 90 days. Rotate it proactively to keep finchctl access uninterrupted.

Covers: service rotate-certificate · certificate expiry check · no agent impact


Rotate the Signing Secret

A break-glass operation that replaces the JWT signing secret and immediately invalidates every enrolled agent's token. Use this when the server-side secret is suspected to have been exposed, or when a full token reset is required.

Covers: service rotate-secret · agent config · agent deploy · re-enrolment loop


Re-enroll an Agent

Shared steps for pushing a fresh Alloy configuration to an agent host after a token is invalidated. Covers both cases: refreshing a token for an existing agent record (agent config) and re-registering after a deregister (agent register). Includes Windows manual instructions.

Covers: agent config · agent register · agent deploy · Windows manual steps