Skip to content

Commit 245e1f0

Browse files
committed
Corrections
Signed-off-by: Ian Maddaus <[email protected]>
1 parent de04147 commit 245e1f0

File tree

11 files changed

+39
-32
lines changed

11 files changed

+39
-32
lines changed

content/360/saas/_index.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ weight = 10
1515

1616
Chef 360 SaaS focuses on job orchestration and node management in the cloud to complete your DevOPS journeys whenever, wherever, and however a business scenario requires. Chef 360 SaaS is hosted, maintained, and upgraded by Chef allowing you to focus on your workflows.
1717

18-
**Whenever**: The Chef 360 SaaS Platform provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate “execute-once" semantics.
18+
**Whenever**: Chef 360 SaaS provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate “execute-once" semantics.
1919

20-
**Wherever**: The Chef 360 SaaS Platform operates across hybrid environments from on-premises data centers through to all major public clouds, and secures the wide variety of platforms and resources supported by Chef.
20+
**Wherever**: Chef 360 SaaS operates across hybrid environments from on-premises data centers through to all major public clouds, and secures the wide variety of platforms and resources supported by Chef.
2121

22-
**Whatever**: The Chef 360 SaaS Platform enables DevOps and security engineering teams—whether they follow ITIL or ChatOps—to leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
22+
**Whatever**: Chef 360 SaaS enables DevOps and security engineering teams—whether they follow ITIL or ChatOps—to leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
2323

24-
The Chef 360 SaaS Platform has a workflow engine to execute varied jobs in compliance and infrastructure management:
24+
Chef 360 SaaS has a workflow engine to execute varied jobs in compliance and infrastructure management:
2525

2626
- Regularly scan, audit, and remediate infrastructure, protecting your fleet with certified industry compliance profiles like CIS, SOC2, and CSPM.
2727
- Create composable jobs quickly using shell scripting and out-of-the-box skills to develop full playbooks, capable of coordinating the other DevOps IaC tools you own.

content/360/saas/get_started/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
+++
2-
title = "Get started with Chef 360 Platform on-prem"
2+
title = "Get started with Chef 360 SaaS"
33
linkTitle = "Get started"
44

55
[menu.cloud]
@@ -9,7 +9,7 @@ parent = "chef_cloud/360/get_started"
99
weight = 10
1010
+++
1111

12-
This section provides quickstart guides for getting started with Chef 360 Platform and its tools.
12+
This section provides quickstart guides for getting started with Chef 360 SaaS and its tools.
1313

1414
## Get started guides
1515

content/360/saas/get_started/define_skills.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ A skill is an agent that gives you the ability to perform actions on a node to a
2020

2121
## Create skill definitions
2222

23-
The following Chef 360 Platform skills are required or recommended for managing nodes, running actions, and returning action results:
23+
The following Chef 360 skills are required or recommended for managing nodes, running actions, and returning action results:
2424

2525
- Courier Runner skill
2626
- Gohai skill

content/360/saas/get_started/enroll_nodes.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ parent = "chef_cloud/360/get_started"
88
weight = 100
99
+++
1010

11-
Node enrollment brings nodes under management by Chef 360 Platform.
11+
Node enrollment brings nodes under management by Chef 360 SaaS.
1212

1313
This document demonstrates two different methods of node enrollment:
1414

@@ -17,7 +17,7 @@ This document demonstrates two different methods of node enrollment:
1717

1818
{{< note >}}
1919

20-
This version of Chef 360 Platform doesn't support node re-enrollment.
20+
This version of Chef 360 SaaS doesn't support node re-enrollment.
2121

2222
{{< /note >}}
2323

@@ -32,7 +32,7 @@ Review the [node requirements]({{< relref "system_requirements#node-requirements
3232
## Single-node enrollment
3333

3434
Single-node enrollment enrolls nodes from the server side.
35-
With this method, you define connection and configuration details and push them up to Chef 360 Platform, which connects to each node and installs Chef Habitat, Chef Node Management, and any skills or agents assigned to a node cohort.
35+
With this method, you define connection and configuration details and push them up to Chef 360 SaaS, which connects to each node and installs Chef Habitat, Chef Node Management, and any skills or agents assigned to a node cohort.
3636

3737
### Enroll Linux nodes
3838

@@ -120,7 +120,7 @@ To enroll a Windows node, follow these steps:
120120
121121
## Cookbook-based enrollment
122122
123-
With cookbook-based enrollment, you enroll nodes from the client side by uploading a [cookbook](https://docs.chef.io/cookbooks/) with enrollment settings to Chef Infra Server and then Chef Infra Client enrolls the node with Chef 360 Platform.
123+
With cookbook-based enrollment, you enroll nodes from the client side by uploading a [cookbook](https://docs.chef.io/cookbooks/) with enrollment settings to Chef Infra Server and then Chef Infra Client enrolls the node with Chef 360 SaaS.
124124
125125
### Enroll nodes
126126
@@ -168,15 +168,15 @@ To configure the cookbooks and define enrollment settings, follow these steps:
168168

169169
Replace:
170170

171-
- `<CHEF_360_FQDN>` with the fully qualified domain name (FQDN) for your Chef 360 Platform deployment.
171+
- `<CHEF_360_FQDN>` with the fully qualified domain name (FQDN) for your Chef 360 SaaS deployment.
172172
- `<ENROLLMENT_TYPE>` with either `full` or `partial` depending on the form of enrollment. Use `full` unless you must `partial`.
173-
- `<API_PORT>` with the API port configured in Chef 360 Platform. The default value is `31000`.
174-
- `<ACCESS_KEY>` with an access key for secure communication with Chef 360 Platform. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
175-
- `<SECRET_KEY>` with a secret key for secure communication with Chef 360 Platform. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
173+
- `<API_PORT>` with the API port configured in Chef 360 SaaS. The default value is `31000`.
174+
- `<ACCESS_KEY>` with an access key for secure communication with Chef 360 SaaS. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
175+
- `<SECRET_KEY>` with a secret key for secure communication with Chef 360 SaaS. Store securely using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or a [secrets manager](https://docs.chef.io/infra_language/secrets/).
176176
- `<COHORT_ID>` with a valid cohort UUID. The cohort defines all skills and settings installed on the node.
177177
- `<HABITAT_BUILDER_URL>` with the URL of the Chef Habitat Builder used by your organization. Default value: `https://bldr.habitat.sh`
178178
- `<VALID_DIR_PATH>` with a temporary working directory where all required builds are downloaded. Specify a valid path based on the OS. Default value: `/tmp`.
179-
- `<UPGRADE_SKILLS>` with `true` or `false`. If `true`, Chef 360 Platform checks for the latest skill versions and installs them if found. Default value: `false`.
179+
- `<UPGRADE_SKILLS>` with `true` or `false`. If `true`, Chef 360 SaaS checks for the latest skill versions and installs them if found. Default value: `false`.
180180

181181
1. Push the wrapper cookbook or policy to the Chef Infra Server.
182182

@@ -195,7 +195,7 @@ To configure the cookbooks and define enrollment settings, follow these steps:
195195

196196
1. Include the wrapper cookbook in your node's run-list by adding it to a role or Policyfile. See the [run-list](https://docs.chef.io/run_lists/) and [role](https://docs.chef.io/roles/#manage-roles) documentation for more information.
197197
198-
The next time Chef Infra Client runs, it executes the `node_management_enroll` resource and the node is enrolled with Chef 360 Platform.
198+
The next time Chef Infra Client runs, it executes the `node_management_enroll` resource and the node is enrolled with Chef 360 SaaS.
199199
200200
## Check the node enrollment status
201201

content/360/saas/get_started/install_cli.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ parent = "chef_cloud/360/get_started"
1010
weight = 40
1111
+++
1212

13-
This page documents how to download and install the Chef 360 Platform CLIs and register your workstation with your Chef 360 Platform deployment.
13+
This page documents how to download and install the Chef 360 Platform CLIs and register your workstation with your Chef 360 SaaS deployment.
1414

1515
## Prerequisites
1616

@@ -73,7 +73,7 @@ To create a profile, follow these steps:
7373

7474
{{< note >}}
7575

76-
If you've configured Chef 360 Platform with a system-generated or custom certificate in the API/UI settings, use the following CLI arguments:
76+
If you've configured Chef 360 SaaS with a system-generated or custom certificate in the API/UI settings, use the following CLI arguments:
7777
7878
- If you don't have the root certificate authority, use the `--insecure` flag. This flag skips certificate validation.
7979
- If have the root certificate authority present, use the `--cafile <ABSOLUTE_PATH_TO_ROOT_CA_FILE>` flag.
@@ -86,7 +86,7 @@ To create a profile, follow these steps:
8686
- `<PROFILE_NAME>` with a profile name for the role that this profile will use. For example, add the `courier-operator` profile name for the `courier-operator` role.
8787
- `<TENANT_URL>` with the tenant URL, for example `https://chef360.example.com:31000`.
8888

89-
The CLI responds with an authorization code that includes a link to log into Chef 360 Platform.
89+
The CLI responds with an authorization code that includes a link to log into Chef 360 SaaS.
9090

9191
```sh
9292
Device Id : ac:de:48:00:11:22-admin-chef-courier-cli
@@ -106,19 +106,19 @@ To create a profile, follow these steps:
106106
107107
1. Select the organization and role you would like to link to this profile and select **Submit**.
108108
109-
{{< figure src="/images/360/select-role.png" width="500px" alt="Chef 360 Platform organization and role selection screen." >}}
109+
{{< figure src="/images/360/select-role.png" width="500px" alt="Chef 360 SaaS organization and role selection screen." >}}
110110
111-
1. On the **Device Authorization** screen, Chef 360 Platform shows your OAuth code and you can select an expiration date for your session.
111+
1. On the **Device Authorization** screen, Chef 360 SaaS shows your OAuth code and you can select an expiration date for your session.
112112
113-
Chef 360 Platform automatically refreshes your access token up to this expiration date.
113+
Chef 360 SaaS automatically refreshes your access token up to this expiration date.
114114
115115
After entering this information, select **Authorize**.
116116
117-
{{< figure src="/images/360/setting-expiry-token.png" alt="Chef 360 Platform device authorization screen with OAuth token and expiration date." width="500px">}}
117+
{{< figure src="/images/360/setting-expiry-token.png" alt="Chef 360 SaaS device authorization screen with OAuth token and expiration date." width="500px">}}
118118
119119
1. Return to your terminal and enter `y` to continue.
120120
121-
The CLI displays your device profile and your workstation is authorized to access Chef 360 Platform services.
121+
The CLI displays your device profile and your workstation is authorized to access Chef 360 SaaS services.
122122
123123
```sh
124124
Is the device authorised? (y or n)
@@ -159,6 +159,10 @@ To create a profile, follow these steps:
159159

160160
1. Repeat this procedure so that you have separate profiles for the Node Manager and Courier Operator roles.
161161

162+
## Additional information
163+
164+
- [Chef 360 CLI reference documentation](https://docs.chef.io/360/1.2/reference/cli/)
165+
162166
## Next step
163167

164168
- [Register the Node Management agent]({{< relref "register_node_agent.md" >}}).

content/360/saas/get_started/jobs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This job template creates a job that's executed one node, it runs immediately, a
2929

3030
## Create the job
3131

32-
When you add the job to Chef 360 Platform, the Courier Dispatcher sends the job definition to the Courier Runner on the specified node which determines when and how to run the job.
32+
When you add the job to Chef 360 SaaS, the Courier Dispatcher sends the job definition to the Courier Runner on the specified node which determines when and how to run the job.
3333
You can submit a job definition using a JSON, YAML, or TOML file. The default format is JSON.
3434

3535
- Add the job run using the job template file:

content/360/saas/get_started/override_settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ weight = 80
99
+++
1010

1111
When you created the Courier Runner skill definition in the previous section,
12-
it contained a base64-encoded TOML string in the value of `content` key. This TOML includes settings that can or should be overridden with settings for your Chef 360 Platform system.
12+
it contained a base64-encoded TOML string in the value of `content` key. This TOML includes settings that can or should be overridden with settings for your Chef 360 SaaS system.
1313
When Node Management runs on a node, it executes Courier Runner using values in the TOML file that are set by values stored in the Courier Runner's default settings or the Courier Runner's override settings.
1414

1515
## Prerequisites

content/360/saas/get_started/set_up.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,3 +56,7 @@ If your login failed because you forgot your password or you missed the five min
5656
1. At your organization's login page (**`https://CUSTOMER_SUBDOMAIN.cloud.chef.io/app/hub`**), select **Forgot Password** and enter the email address you used sign up with Chef 360 SaaS.
5757

5858
1. You'll receive an email with a link to reset your password. You have five minutes follow the link and create a new password.
59+
60+
## Next step
61+
62+
- [Install Chef 360 CLIs]({{< relref "install_cli" >}})

content/360/saas/get_started/system_requirements.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Open the following default ports for outbound connections.
2727

2828
### Cookbook-based enrollment
2929

30-
Nodes enrolled with Chef 360 Platform using a Chef Infra cookbook have the following requirements:
30+
Nodes enrolled with Chef 360 SaaS using a Chef Infra cookbook have the following requirements:
3131

3232
- Nodes must have Chef Infra Client installed.
3333
- Nodes have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
@@ -46,8 +46,8 @@ Connection requirements:
4646
- Nodes must have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
4747
- Nodes must allow for outbound and inbound communication with <https://bldr.habitat.sh>
4848
- A node IP address can’t be localhost (127.0.0.1)
49-
- A node CIDR address can’t be in the same range as the Chef 360 Platform services. The default CIDR range for Chef 360 Platform services is `10.244.0.0/16` or `10.96.0.0/12`.
50-
- The node’s ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 Platform. Additionally, the Chef 360 Platform should allow inbound connections to these ports from the node.
49+
- A node CIDR address can’t be in the same range as the Chef 360 SaaS services. The default CIDR range for Chef 360 SaaS services is `10.244.0.0/16` or `10.96.0.0/12`.
50+
- The node’s ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 SaaS. Additionally, the Chef 360 SaaS should allow inbound connections to these ports from the node.
5151

5252
Nodes connected to with SSH have the following requirements:
5353

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
A node cohort defines skills and settings installed on every node in a cohort.
22

3-
After you create a cohort, you assign nodes to the cohort during node enrollment, and Chef 360 Platform installs or removes the skills and settings on every node accordingly.
3+
After you create a cohort, you assign nodes to the cohort during node enrollment and Chef 360 SaaS installs or removes the skills and settings on every node accordingly.

0 commit comments

Comments
 (0)