You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/360/saas/_index.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,13 +15,13 @@ weight = 10
15
15
16
16
Chef 360 SaaS focuses on job orchestration and node management in the cloud to complete your DevOPS journeys whenever, wherever, and however a business scenario requires. Chef 360 SaaS is hosted, maintained, and upgraded by Chef allowing you to focus on your workflows.
17
17
18
-
**Whenever**: The Chef 360 SaaS Platform provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate “execute-once" semantics.
18
+
**Whenever**: Chef 360 SaaS provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate “execute-once" semantics.
19
19
20
-
**Wherever**: The Chef 360 SaaS Platform operates across hybrid environments from on-premises data centers through to all major public clouds, and secures the wide variety of platforms and resources supported by Chef.
20
+
**Wherever**: Chef 360 SaaS operates across hybrid environments from on-premises data centers through to all major public clouds, and secures the wide variety of platforms and resources supported by Chef.
21
21
22
-
**Whatever**: The Chef 360 SaaS Platform enables DevOps and security engineering teams—whether they follow ITIL or ChatOps—to leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
22
+
**Whatever**: Chef 360 SaaS enables DevOps and security engineering teams—whether they follow ITIL or ChatOps—to leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
23
23
24
-
The Chef 360 SaaS Platform has a workflow engine to execute varied jobs in compliance and infrastructure management:
24
+
Chef 360 SaaS has a workflow engine to execute varied jobs in compliance and infrastructure management:
25
25
26
26
- Regularly scan, audit, and remediate infrastructure, protecting your fleet with certified industry compliance profiles like CIS, SOC2, and CSPM.
27
27
- Create composable jobs quickly using shell scripting and out-of-the-box skills to develop full playbooks, capable of coordinating the other DevOps IaC tools you own.
Node enrollment brings nodes under management by Chef 360 Platform.
11
+
Node enrollment brings nodes under management by Chef 360 SaaS.
12
12
13
13
This document demonstrates two different methods of node enrollment:
14
14
@@ -17,7 +17,7 @@ This document demonstrates two different methods of node enrollment:
17
17
18
18
{{< note >}}
19
19
20
-
This version of Chef 360 Platform doesn't support node re-enrollment.
20
+
This version of Chef 360 SaaS doesn't support node re-enrollment.
21
21
22
22
{{< /note >}}
23
23
@@ -32,7 +32,7 @@ Review the [node requirements]({{< relref "system_requirements#node-requirements
32
32
## Single-node enrollment
33
33
34
34
Single-node enrollment enrolls nodes from the server side.
35
-
With this method, you define connection and configuration details and push them up to Chef 360 Platform, which connects to each node and installs Chef Habitat, Chef Node Management, and any skills or agents assigned to a node cohort.
35
+
With this method, you define connection and configuration details and push them up to Chef 360 SaaS, which connects to each node and installs Chef Habitat, Chef Node Management, and any skills or agents assigned to a node cohort.
36
36
37
37
### Enroll Linux nodes
38
38
@@ -120,7 +120,7 @@ To enroll a Windows node, follow these steps:
120
120
121
121
## Cookbook-based enrollment
122
122
123
-
With cookbook-based enrollment, you enroll nodes from the client side by uploading a [cookbook](https://docs.chef.io/cookbooks/) with enrollment settings to Chef Infra Server and then Chef Infra Client enrolls the node with Chef 360 Platform.
123
+
With cookbook-based enrollment, you enroll nodes from the client side by uploading a [cookbook](https://docs.chef.io/cookbooks/) with enrollment settings to Chef Infra Server and then Chef Infra Client enrolls the node with Chef 360 SaaS.
124
124
125
125
### Enroll nodes
126
126
@@ -168,15 +168,15 @@ To configure the cookbooks and define enrollment settings, follow these steps:
168
168
169
169
Replace:
170
170
171
-
- `<CHEF_360_FQDN>` with the fully qualified domain name (FQDN) for your Chef 360 Platform deployment.
171
+
- `<CHEF_360_FQDN>` with the fully qualified domain name (FQDN) for your Chef 360 SaaS deployment.
172
172
- `<ENROLLMENT_TYPE>` with either `full` or `partial` depending on the form of enrollment. Use `full` unless you must `partial`.
173
-
- `<API_PORT>` with the API port configured in Chef 360 Platform. The default value is `31000`.
174
-
- `<ACCESS_KEY>` with an access key for secure communication with Chef 360 Platform. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
175
-
- `<SECRET_KEY>` with a secret key for secure communication with Chef 360 Platform. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
173
+
- `<API_PORT>` with the API port configured in Chef 360 SaaS. The default value is `31000`.
174
+
- `<ACCESS_KEY>` with an access key for secure communication with Chef 360 SaaS. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
175
+
- `<SECRET_KEY>` with a secret key for secure communication with Chef 360 SaaS. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
176
176
- `<COHORT_ID>` with a valid cohort UUID. The cohort defines all skills and settings installed on the node.
177
177
- `<HABITAT_BUILDER_URL>` with the URL of the Chef Habitat Builder used by your organization. Default value: `https://bldr.habitat.sh`
178
178
- `<VALID_DIR_PATH>` with a temporary working directory where all required builds are downloaded. Specify a valid path based on the OS. Default value: `/tmp`.
179
-
- `<UPGRADE_SKILLS>` with `true` or `false`. If `true`, Chef 360 Platform checks for the latest skill versions and installs them if found. Default value: `false`.
179
+
- `<UPGRADE_SKILLS>` with `true` or `false`. If `true`, Chef 360 SaaS checks for the latest skill versions and installs them if found. Default value: `false`.
180
180
181
181
1. Push the wrapper cookbook or policy to the Chef Infra Server.
182
182
@@ -195,7 +195,7 @@ To configure the cookbooks and define enrollment settings, follow these steps:
195
195
196
196
1. Include the wrapper cookbook in your node's run-list by adding it to a role or Policyfile. See the [run-list](https://docs.chef.io/run_lists/) and [role](https://docs.chef.io/roles/#manage-roles) documentation for more information.
197
197
198
-
The next time Chef Infra Client runs, it executes the `node_management_enroll` resource and the node is enrolled with Chef 360 Platform.
198
+
The next time Chef Infra Client runs, it executes the `node_management_enroll` resource and the node is enrolled with Chef 360 SaaS.
This page documents how to download and install the Chef 360 Platform CLIs and register your workstation with your Chef 360 Platform deployment.
13
+
This page documents how to download and install the Chef 360 Platform CLIs and register your workstation with your Chef 360 SaaS deployment.
14
14
15
15
## Prerequisites
16
16
@@ -73,7 +73,7 @@ To create a profile, follow these steps:
73
73
74
74
{{< note >}}
75
75
76
-
If you've configured Chef 360 Platform with a system-generated or custom certificate in the API/UI settings, use the following CLI arguments:
76
+
If you've configured Chef 360 SaaS with a system-generated or custom certificate in the API/UI settings, use the following CLI arguments:
77
77
78
78
- If you don't have the root certificate authority, use the `--insecure` flag. This flag skips certificate validation.
79
79
- If have the root certificate authority present, use the `--cafile <ABSOLUTE_PATH_TO_ROOT_CA_FILE>` flag.
@@ -86,7 +86,7 @@ To create a profile, follow these steps:
86
86
- `<PROFILE_NAME>` with a profile name for the role that this profile will use. For example, add the `courier-operator` profile name for the `courier-operator` role.
87
87
- `<TENANT_URL>` with the tenant URL, for example `https://chef360.example.com:31000`.
88
88
89
-
The CLI responds with an authorization code that includes a link to log into Chef 360 Platform.
89
+
The CLI responds with an authorization code that includes a link to log into Chef 360 SaaS.
90
90
91
91
```sh
92
92
Device Id : ac:de:48:00:11:22-admin-chef-courier-cli
@@ -106,19 +106,19 @@ To create a profile, follow these steps:
106
106
107
107
1. Select the organization and role you would like to link to this profile and select **Submit**.
108
108
109
-
{{< figure src="/images/360/select-role.png" width="500px" alt="Chef 360 Platform organization and role selection screen." >}}
109
+
{{< figure src="/images/360/select-role.png" width="500px" alt="Chef 360 SaaS organization and role selection screen." >}}
110
110
111
-
1. On the **Device Authorization** screen, Chef 360 Platform shows your OAuth code and you can select an expiration date for your session.
111
+
1. On the **Device Authorization** screen, Chef 360 SaaS shows your OAuth code and you can select an expiration date for your session.
112
112
113
-
Chef 360 Platform automatically refreshes your access token up to this expiration date.
113
+
Chef 360 SaaS automatically refreshes your access token up to this expiration date.
114
114
115
115
After entering this information, select **Authorize**.
116
116
117
-
{{< figure src="/images/360/setting-expiry-token.png" alt="Chef 360 Platform device authorization screen with OAuth token and expiration date." width="500px">}}
117
+
{{< figure src="/images/360/setting-expiry-token.png" alt="Chef 360 SaaS device authorization screen with OAuth token and expiration date." width="500px">}}
118
118
119
119
1. Return to your terminal and enter `y` to continue.
120
120
121
-
The CLI displays your device profile and your workstation is authorized to access Chef 360 Platform services.
121
+
The CLI displays your device profile and your workstation is authorized to access Chef 360 SaaS services.
122
122
123
123
```sh
124
124
Is the device authorised? (y or n)
@@ -159,6 +159,10 @@ To create a profile, follow these steps:
159
159
160
160
1. Repeat this procedure so that you have separate profiles for the Node Manager and Courier Operator roles.
Copy file name to clipboardExpand all lines: content/360/saas/get_started/jobs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ This job template creates a job that's executed one node, it runs immediately, a
29
29
30
30
## Create the job
31
31
32
-
When you add the job to Chef 360 Platform, the Courier Dispatcher sends the job definition to the Courier Runner on the specified node which determines when and how to run the job.
32
+
When you add the job to Chef 360 SaaS, the Courier Dispatcher sends the job definition to the Courier Runner on the specified node which determines when and how to run the job.
33
33
You can submit a job definition using a JSON, YAML, or TOML file. The default format is JSON.
Copy file name to clipboardExpand all lines: content/360/saas/get_started/override_settings.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ weight = 80
9
9
+++
10
10
11
11
When you created the Courier Runner skill definition in the previous section,
12
-
it contained a base64-encoded TOML string in the value of `content` key. This TOML includes settings that can or should be overridden with settings for your Chef 360 Platform system.
12
+
it contained a base64-encoded TOML string in the value of `content` key. This TOML includes settings that can or should be overridden with settings for your Chef 360 SaaS system.
13
13
When Node Management runs on a node, it executes Courier Runner using values in the TOML file that are set by values stored in the Courier Runner's default settings or the Courier Runner's override settings.
Copy file name to clipboardExpand all lines: content/360/saas/get_started/set_up.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,3 +56,7 @@ If your login failed because you forgot your password or you missed the five min
56
56
1. At your organization's login page (**`https://CUSTOMER_SUBDOMAIN.cloud.chef.io/app/hub`**), select **Forgot Password** and enter the email address you used sign up with Chef 360 SaaS.
57
57
58
58
1. You'll receive an email with a link to reset your password. You have five minutes follow the link and create a new password.
59
+
60
+
## Next step
61
+
62
+
-[Install Chef 360 CLIs]({{< relref "install_cli" >}})
Copy file name to clipboardExpand all lines: content/360/saas/get_started/system_requirements.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Open the following default ports for outbound connections.
27
27
28
28
### Cookbook-based enrollment
29
29
30
-
Nodes enrolled with Chef 360 Platform using a Chef Infra cookbook have the following requirements:
30
+
Nodes enrolled with Chef 360 SaaS using a Chef Infra cookbook have the following requirements:
31
31
32
32
- Nodes must have Chef Infra Client installed.
33
33
- Nodes have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
@@ -46,8 +46,8 @@ Connection requirements:
46
46
- Nodes must have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
47
47
- Nodes must allow for outbound and inbound communication with <https://bldr.habitat.sh>
48
48
- A node IP address can’t be localhost (127.0.0.1)
49
-
- A node CIDR address can’t be in the same range as the Chef 360 Platform services. The default CIDR range for Chef 360 Platform services is `10.244.0.0/16` or `10.96.0.0/12`.
50
-
- The node’s ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 Platform. Additionally, the Chef 360 Platform should allow inbound connections to these ports from the node.
49
+
- A node CIDR address can’t be in the same range as the Chef 360 SaaS services. The default CIDR range for Chef 360 SaaS services is `10.244.0.0/16` or `10.96.0.0/12`.
50
+
- The node’s ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 SaaS. Additionally, the Chef 360 SaaS should allow inbound connections to these ports from the node.
51
51
52
52
Nodes connected to with SSH have the following requirements:
A node cohort defines skills and settings installed on every node in a cohort.
2
2
3
-
After you create a cohort, you assign nodes to the cohort during node enrollment, and Chef 360 Platform installs or removes the skills and settings on every node accordingly.
3
+
After you create a cohort, you assign nodes to the cohort during node enrollment and Chef 360 SaaS installs or removes the skills and settings on every node accordingly.
0 commit comments