You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/360/saas/_index.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,18 +15,18 @@ weight = 10
15
15
16
16
Chef 360 SaaS focuses on job orchestration and node management in the cloud to complete your DevOPS journeys whenever, wherever, and however a business scenario requires. Chef 360 SaaS is hosted, maintained, and upgraded by Chef allowing you to focus on your workflows.
17
17
18
-
**Whenever**: Chef 360 SaaS provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate “execute-once" semantics.
18
+
**Whenever**: Chef 360 SaaS provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate "execute-once" semantics.
19
19
20
20
**Wherever**: Chef 360 SaaS operates across hybrid environments from on-premises data centers through to all major public clouds, and secures the wide variety of platforms and resources supported by Chef.
21
21
22
-
**Whatever**: Chef 360 SaaS enables DevOps and security engineering teams—whether they follow ITIL or ChatOps—to leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
22
+
**Whatever**: Chef 360 SaaS enables DevOps and security engineering teams--whether they follow ITIL or ChatOps--to leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
23
23
24
24
Chef 360 SaaS has a workflow engine to execute varied jobs in compliance and infrastructure management:
25
25
26
26
- Regularly scan, audit, and remediate infrastructure, protecting your fleet with certified industry compliance profiles like CIS, SOC2, and CSPM.
27
27
- Create composable jobs quickly using shell scripting and out-of-the-box skills to develop full playbooks, capable of coordinating the other DevOps IaC tools you own.
28
28
- Safely build, package, and deploy applications from a fully cloud-native, zero-trust platform in conjunction with Chef Habitat.
29
-
- Discover assets effortlessly from existing Chef environments, other Progress products like What’s-Up-Gold, and even your own CMDB and monitoring solutions.
29
+
- Discover assets effortlessly from existing Chef environments, other Progress products like What's-Up-Gold, and even your own CMDB and monitoring solutions.
30
30
- Leverage an open partner ecosystem with Chef premium content and content from thought leaders such as OSL and MITRE, and easily extensible formats which require no special knowledge.
Copy file name to clipboardExpand all lines: content/360/saas/get_started/system_requirements.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,11 +32,11 @@ Nodes enrolled with Chef 360 SaaS using a Chef Infra cookbook have the following
32
32
- Nodes must have Chef Infra Client installed.
33
33
- Nodes have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
34
34
- Nodes must allow for outbound and inbound communication with <https://bldr.habitat.sh>
35
-
- Nodes can’t have localhost (127.0.0.1) as an IP address.
35
+
- Nodes can't have localhost (127.0.0.1) as an IP address.
36
36
- You must have sudo privileges on the node.
37
37
- Note: Requires Chef Infra Server or running Chef Infra Client in zero mode. For SaaS, this requires Chef 360 SaaS Enterprise.
38
38
39
-
### Chef 360 platform-based enrollment
39
+
### Chef 360 SaaS enrollment
40
40
41
41
Nodes enrolled using single-node enrollment have the following requirements.
42
42
@@ -45,9 +45,9 @@ Connection requirements:
45
45
- Nodes must be accessible with SSH or WinRM from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
46
46
- Nodes must have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
47
47
- Nodes must allow for outbound and inbound communication with <https://bldr.habitat.sh>
48
-
- A node IP address can’t be localhost (127.0.0.1)
49
-
- A node CIDR address can’t be in the same range as the Chef 360 SaaS services. The default CIDR range for Chef 360 SaaS services is`10.244.0.0/16` or `10.96.0.0/12`.
50
-
- The node’s ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 SaaS. Additionally, the Chef 360 SaaS should allow inbound connections to these ports from the node.
48
+
- A node IP address can't be localhost (127.0.0.1)
49
+
- A node CIDR address can't be in the same range as the Chef 360 SaaS services. The default CIDR range for Chef 360 SaaS services is`10.244.0.0/16` or `10.96.0.0/12`.
50
+
- The node's ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 SaaS.
51
51
52
52
Nodes connected to with SSH have the following requirements:
53
53
@@ -57,7 +57,7 @@ Nodes connected to with SSH have the following requirements:
57
57
58
58
Nodes connected to with WinRM have the following requirements:
0 commit comments