You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/360/saas/get_started/enroll_nodes.md
+10-20
Original file line number
Diff line number
Diff line change
@@ -120,7 +120,7 @@ To enroll a Windows node, follow these steps:
120
120
121
121
## Cookbook-based enrollment
122
122
123
-
With cookbook-based enrollment, you enroll nodes from the client side by uploading a [cookbook](https://docs.chef.io/cookbooks/) with enrollment settings to Chef Infra Server and then Chef Infra Client enrolls the node with Chef 360 SaaS.
123
+
With cookbook-based enrollment, you enroll nodes from the client side by uploading a [cookbook](/cookbooks/) with enrollment settings to Chef Infra Server and then Chef Infra Client enrolls the node with Chef 360 SaaS.
124
124
125
125
### Enroll nodes with a cookbook
126
126
@@ -144,13 +144,13 @@ To configure the cookbooks and define enrollment settings, follow these steps:
144
144
chef generate cookbook <COOKBOOK_NAME>
145
145
```
146
146
147
-
In the [`metadata.rb` file](https://docs.chef.io/config_rb_metadata/) of your wrapper cookbook, add the following dependency to include the `chef-cookbook-enroll` cookbook:
147
+
In the [`metadata.rb` file](/config_rb_metadata/) of your wrapper cookbook, add the following dependency to include the `chef-cookbook-enroll` cookbook:
148
148
149
149
```ruby
150
150
depends 'chef360-node-enroll', '~> 1.0.0'
151
151
```
152
152
153
-
1. Create a copy of the Chef 360 SaaS public key and add it to the wrapper cookbook's `files` directory:
153
+
1. Copy of the Chef 360 SaaS public key and add it to your wrapper cookbook:
154
154
155
155
```plaintext
156
156
-----BEGIN CERTIFICATE-----
@@ -178,14 +178,6 @@ To configure the cookbooks and define enrollment settings, follow these steps:
178
178
179
179
This public key expires on March 18, 2029.
180
180
181
-
1. Create an attribute file that includes the path to the public key. For example:
Replace `<COOKBOOK_NAME>` with the name of the wrapper cookbook.
188
-
189
181
1. Generate an access key and secret key:
190
182
191
183
```bash
@@ -216,8 +208,6 @@ To configure the cookbooks and define enrollment settings, follow these steps:
216
208
}
217
209
```
218
210
219
-
1. Store the access key and secret key using an [encrypted Chef data bag](https://docs.chef.io/data_bags/) or with a [secrets manager](https://docs.chef.io/infra_language/secrets/).
220
-
221
211
1. Define the `node_management_enroll` resource in your wrapper cookbook's recipe:
222
212
223
213
```ruby
@@ -229,8 +219,8 @@ To configure the cookbooks and define enrollment settings, follow these steps:
229
219
secret_key '<SECRET_KEY>'
230
220
cohort_id '<COHORT_ID>'
231
221
hab_builder_url '<HABITAT_BUILDER_URL>'
232
-
working_dir_path '<VALID_DIR_PATH>'
233
222
root_ca <CHEF_360_SAAS_PUBLIC_KEY>
223
+
working_dir_path '<VALID_DIR_PATH>'
234
224
upgrade_skills <UPGRADE_SKILLS>
235
225
end
236
226
```
@@ -240,30 +230,30 @@ To configure the cookbooks and define enrollment settings, follow these steps:
240
230
- `<CHEF_360_FQDN>` with the fully qualified domain name (FQDN) for your Chef 360 SaaS deployment.
241
231
- `<ENROLLMENT_TYPE>` with either `full` or `partial` depending on the form of enrollment. Use `full` unless you must `partial`.
242
232
- `<API_PORT>` with the API port configured in Chef 360 SaaS. The default value is `31000`.
243
-
- `<ACCESS_KEY>` with the access key for secure communication with Chef 360 SaaS.
244
-
- `<SECRET_KEY>` with the secret key for secure communication with Chef 360 SaaS.
233
+
- `<ACCESS_KEY>` with the access key for secure communication with Chef 360 SaaS. This should be stored using an [encrypted Chef data bag](/data_bags/) or [secrets manager](/infra_language/secrets/).
234
+
- `<SECRET_KEY>` with the secret key for secure communication with Chef 360 SaaS. This should be stored using an [encrypted Chef data bag](/data_bags/) or [secrets manager](/infra_language/secrets/).
245
235
- `<COHORT_ID>` with a valid cohort UUID. The cohort defines all skills and settings installed on the node.
246
236
- `<HABITAT_BUILDER_URL>` with the URL of the Chef Habitat Builder used by your organization. Default value: `https://bldr.habitat.sh`
237
+
- `<CHEF_360_SAAS_PUBLIC_KEY>`if TLS is enabled, with the root CA public key. For example, `node['enroll']['root_ca']`.
247
238
- `<VALID_DIR_PATH>` with a temporary working directory where all required builds are downloaded. Specify a valid path based on the OS. Default value: `/tmp`.
248
-
- `<CHEF_360_SAAS_PUBLIC_KEY>` with the attribute for the root CA public key. For example, `node['enroll']['root_ca']`.
249
239
- `<UPGRADE_SKILLS>` with `true` or `false`. If `true`, Chef 360 SaaS checks for the latest skill versions and installs them if found. Default value: `false`.
250
240
251
241
1. Push the wrapper cookbook or policy to the Chef Infra Server.
252
242
253
-
1. If you're using a role, [upload](https://docs.chef.io/workstation/knife_cookbook/#upload) the wrapper cookbook to the Chef Infra Server:
243
+
1. If you're using a role, [upload](/workstation/knife_cookbook/#upload) the wrapper cookbook to the Chef Infra Server:
1. If you're using a Policyfile, [create `Policyfile.lock.json` file](https://docs.chef.io/workstation/ctl_chef/#chef-install) and [push](https://docs.chef.io/workstation/ctl_chef/#chef-push) the Policyfile to Chef Infra Server:
249
+
1. If you're using a Policyfile, [create `Policyfile.lock.json` file](/workstation/ctl_chef/#chef-install) and [push](/workstation/ctl_chef/#chef-push) the Policyfile to Chef Infra Server:
260
250
261
251
```bash
262
252
chef install
263
253
chef push <POLICY_GROUP><POLICYFILE>
264
254
```
265
255
266
-
1. Include the wrapper cookbook in your node's run-list by adding it to a role or Policyfile. See the [run-list](https://docs.chef.io/run_lists/) and [role](https://docs.chef.io/roles/#manage-roles) documentation for more information.
256
+
1. Include the wrapper cookbook in your node's run-list by adding it to a role or Policyfile. See the [run-list](/run_lists/) and [role](/roles/#manage-roles) documentation for more information.
267
257
268
258
The next time Chef Infra Client runs, it executes the `node_management_enroll` resource and the node is enrolled with Chef 360 SaaS.
0 commit comments