Skip to content

Commit adf2269

Browse files
committed
Lint fix
Signed-off-by: Ian Maddaus <[email protected]>
1 parent 245e1f0 commit adf2269

File tree

4 files changed

+10
-11
lines changed

4 files changed

+10
-11
lines changed

content/360/saas/_index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,18 +15,18 @@ weight = 10
1515

1616
Chef 360 SaaS focuses on job orchestration and node management in the cloud to complete your DevOPS journeys whenever, wherever, and however a business scenario requires. Chef 360 SaaS is hosted, maintained, and upgraded by Chef allowing you to focus on your workflows.
1717

18-
**Whenever**: Chef 360 SaaS provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate execute-once" semantics.
18+
**Whenever**: Chef 360 SaaS provides real-time observability of the changing infrastructure environment through scheduled actions, continuous scanning or immediate "execute-once" semantics.
1919

2020
**Wherever**: Chef 360 SaaS operates across hybrid environments from on-premises data centers through to all major public clouds, and secures the wide variety of platforms and resources supported by Chef.
2121

22-
**Whatever**: Chef 360 SaaS enables DevOps and security engineering teamswhether they follow ITIL or ChatOpsto leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
22+
**Whatever**: Chef 360 SaaS enables DevOps and security engineering teams--whether they follow ITIL or ChatOps--to leverage the native JSON syntax or use one of several, extensible infrastructure-as-code DSLs.
2323

2424
Chef 360 SaaS has a workflow engine to execute varied jobs in compliance and infrastructure management:
2525

2626
- Regularly scan, audit, and remediate infrastructure, protecting your fleet with certified industry compliance profiles like CIS, SOC2, and CSPM.
2727
- Create composable jobs quickly using shell scripting and out-of-the-box skills to develop full playbooks, capable of coordinating the other DevOps IaC tools you own.
2828
- Safely build, package, and deploy applications from a fully cloud-native, zero-trust platform in conjunction with Chef Habitat.
29-
- Discover assets effortlessly from existing Chef environments, other Progress products like Whats-Up-Gold, and even your own CMDB and monitoring solutions.
29+
- Discover assets effortlessly from existing Chef environments, other Progress products like What's-Up-Gold, and even your own CMDB and monitoring solutions.
3030
- Leverage an open partner ecosystem with Chef premium content and content from thought leaders such as OSL and MITRE, and easily extensible formats which require no special knowledge.
3131

3232
## Additional guides

content/360/saas/get_started/override_settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Create node override settings for the Courier Runner and Gohai skills.
3838
{
3939
"item": {
4040
"settingId": "<SETTING_ID>"
41-
41+
}
4242
}
4343
```
4444

content/360/saas/get_started/system_requirements.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,11 @@ Nodes enrolled with Chef 360 SaaS using a Chef Infra cookbook have the following
3232
- Nodes must have Chef Infra Client installed.
3333
- Nodes have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
3434
- Nodes must allow for outbound and inbound communication with <https://bldr.habitat.sh>
35-
- Nodes cant have localhost (127.0.0.1) as an IP address.
35+
- Nodes can't have localhost (127.0.0.1) as an IP address.
3636
- You must have sudo privileges on the node.
3737
- Note: Requires Chef Infra Server or running Chef Infra Client in zero mode. For SaaS, this requires Chef 360 SaaS Enterprise.
3838

39-
### Chef 360 platform-based enrollment
39+
### Chef 360 SaaS enrollment
4040

4141
Nodes enrolled using single-node enrollment have the following requirements.
4242

@@ -45,9 +45,9 @@ Connection requirements:
4545
- Nodes must be accessible with SSH or WinRM from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
4646
- Nodes must have a public DNS or public IP address that can be reached from `https://CUSTOMER_SUBDOMAIN.cloud.chef.io`.
4747
- Nodes must allow for outbound and inbound communication with <https://bldr.habitat.sh>
48-
- A node IP address cant be localhost (127.0.0.1)
49-
- A node CIDR address cant be in the same range as the Chef 360 SaaS services. The default CIDR range for Chef 360 SaaS services is`10.244.0.0/16` or `10.96.0.0/12`.
50-
- The nodes ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 SaaS. Additionally, the Chef 360 SaaS should allow inbound connections to these ports from the node.
48+
- A node IP address can't be localhost (127.0.0.1)
49+
- A node CIDR address can't be in the same range as the Chef 360 SaaS services. The default CIDR range for Chef 360 SaaS services is `10.244.0.0/16` or `10.96.0.0/12`.
50+
- The node's ports for RabbitMQ (31050) and the nginx API gateway (31000) must be open to Chef 360 SaaS.
5151

5252
Nodes connected to with SSH have the following requirements:
5353

@@ -57,7 +57,7 @@ Nodes connected to with SSH have the following requirements:
5757

5858
Nodes connected to with WinRM have the following requirements:
5959

60-
- Ports 59855986 must be open.
60+
- Ports 5985 and 5986 must be open.
6161
- Configure WinRM by running the following:
6262

6363
```ps1

content/360/saas/reusable_text/md/skill_assembly_get_started.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22

33
{{% readfile file="_vendor/github.com/chef/samples/cohorts/skill-assembly.json" highlight="json" %}}
44

5-
65
1. Create the skill assembly:
76

87
```sh

0 commit comments

Comments
 (0)