Skip to main content

AWS Marketplace

[edit on GitHub]

Chef Automate is an enterprise platform that allows developers, operations, and security engineers to collaborate on application and infrastructure changes with speed and at scale. Chef Automate provides actionable insights across data centers and cloud providers, wherever your nodes live.

Chef Automate is the center of the modern Chef platform, providing users with a single source of truth for infrastructure, security, and application automation. The comprehensive dashboard provides real-time views of your configuration management activity. Chef Automate comes bundled with the latest Chef Infra Server, providing the core tools you need to manage your enterprise infrastructure. Data collection is enabled by default, allowing your nodes to report activity in real-time. This instance is free for 60 days or you can bring your own license (BYOL).

Use this instance with Chef Workstation installed on your laptop or a separate AWS instance.

Chef Workstation includes:

  • Chef Infra Client
  • Chef InSpec
  • Chef Habitat
  • chef and knife command line tools
  • Testing tools, such as Test Kitchen and Cookstyle
  • Everything else needed to author cookbooks and upload them to the Chef Infra Server.

If you need to run Chef Automate with a high availability (HA) topology, please contact Chef Support.

Installation

Select Chef Automate in the AWS Marketplace.

The Chef Automate AWS deployment uses CloudFormation. Download the CloudFormation template or use the view the template in CloudFormation Designer

Every CloudFormation Stack deployment creates a new Virtual Private Cloud (VPC).

Note

AWS provides 5 VPCs for each region. If you require more VPCs, please contact AWS Support.

Start Chef Automate with CloudFormation

  1. Enter the following values for your deployment.

    • Stack Name: Chef-Automate
    • EC2RootVolumeSize: Default: 40
    • Instance Type:Default: t2.xlarge
    • KeyName: Enter your existing keypair
    • SecurityGroupCidrIp: 0.0.0.0/0
    • SubnetCIDR: 10.0.0.0/24
    • VpcCIDR: 10.0.0.0/16
  2. Select Next and create your Chef Automate deployment. This process can take several minutes.

  3. Give Chef Automate an additional five minutes for all the services to start running.

Select next to create stack

Post-Installation

  1. Navigate to the AWS deployment Outputs tab and locate the Chef Automate URL, user name, and password. You will need these in the next steps. AWS Chef Automate deployment Outputs tab contains your instance URL, user name, and password

  2. Open your browser and paste the Chef Automate URL, which will open an alert page.

  3. Select Advanced and continue. Select ‘advanced’ to bypass the warning that the page is not secure.

  4. Enter your Username and Password and select Sign In.

  5. Fill out the registration form and Accept the Chef License.

  6. Select Register to enter Chef Automate.

  7. Congratulations! You’ve started Chef Automate!

Add Chef Servers

  1. Add Chef-Server Details, select the Add Chef Infra Server Button.

  2. Enter the server name, FQDN, and IP address. Then select Add Chef Infra Server to create the server.

    • Name: Add Proper Name for the Sever.
    • FQDN: It would be the same as Automate FQDN.
    • IP Address: Public IP Address of the EC2-Instance.

    Add Chef Infra Server Form

  3. The Chef Infra Server will appear in the list of servers. Select the server and view information about it. Select a server from the list

  4. Select Add Chef Organization.

  5. Enter the following information:

    • Name: demo
    • Admin User: admin
    • Admin Key: copy the key from starter kit
  6. Select Add Chef Organization. Select the Add Chef Organization button to complete this action

AWS Deployment Security

Update the AWS Deployment Security Group to require source IP addresses for a secure SSH connection.

  1. Select the Instance Security group in the Resources tab of your AWS Chef Automate deployment.

  2. Select the Security Group ID for your Chef Automate deployment. Locate and copy your security group ID from the second column

  3. Select Edit inbound rules. Select the Edit inbound rules button

  4. Select Add rule and then SSH and enter the source IP.

  5. Select Save rules to finish. Add your IP address range as a custom SSH rule

Was this page helpful?

×









Search Results