Skip to content

Commit 4ed352e

Browse files
committed
More editing
Signed-off-by: Ian Maddaus <ian.maddaus@progress.com>
1 parent 2962db3 commit 4ed352e

File tree

2 files changed

+14
-10
lines changed

2 files changed

+14
-10
lines changed

content/tools/chef_vault.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,27 +12,31 @@ draft = false
1212
weight = 50
1313
+++
1414

15-
`chef-vault` is a Ruby Gem that's included in Chef Workstation and Chef
16-
Infra Client. Chef Vault lets you encrypt a data bag item using asymmetric keys. When you provide Chef Vault with a list of public keys from your nodes, only the nodes with public keys entered on this list can decrypt the data bag item contents. Chef Vault is included in Chef Workstation and Chef Infra Client by way of the `chef-vault` Ruby Gem. `chef-vault` uses the `knife vault` subcommand.
15+
Chef Vault lets you encrypt a data bag item using asymmetric keys and is included with Chef Workstation and Chef Infra Client.
16+
When you provide Chef Vault with a list of public keys from your nodes, only nodes on that list can decrypt the data bag item contents.
17+
`chef-vault` uses the `knife vault` subcommand.
1718

1819
{{< note >}}
1920

20-
Chef Vault doesn't currently support alternate keying mechanisms like GPG and Amazon KMS.
21+
Chef Vault doesn't support alternate keying mechanisms like GPG or Amazon KMS.
2122

2223
{{< /note >}}
2324

24-
{{< warning >}}
25+
## Key pair requirements
26+
27+
Chef Vault requires that Chef Infra Client is configured to use public and private key pairs.
28+
Chef Vault is incompatible with Chef Infra Client instances that use a private key, such as `client.pem`, with a certificate set as its public identity in the Chef Infra Server database.
29+
30+
To update existing nodes to use `chef-vault`, re-register your Chef Infra Client nodes with Chef Infra Server, which generates public/private key pairs, and then install Chef Vault on each node.
2531

26-
To use Chef Vault, Chef Infra Client must be configured to use public and private key pairs. Chef Vault is incompatible with the practice of using Chef Infra Client with a private key, such as `client.pem`, and a certificate set as its public identity in the Chef Infra Server database. To update existing nodes to use `chef-vault`, first re-register your Chef Infra Client nodes with Chef Infra Server which will generate public/private key pairs, and then install Chef Vault on each node. If Chef Vault is used with a Chef Infra Client instance that has a private key, such as `client.pem`, and a certificate set as its public identity in the Chef Infra Server database, Chef Vault generates the following error:
32+
If Chef Vault is used with a Chef Infra Client instance configured this way, Chef Vault generates the following error:
2733

2834
```text
2935
## OpenSSL::PKey::RSAError
3036
Neither PUB key nor PRIV key:: nested asn1 error
3137
```
3238

33-
{{< /warning >}}
34-
35-
## Configuring config.rb for Chef Vault
39+
## Configure Chef Vault
3640

3741
To set `client` as the default mode, add the following line to the `config.rb` file.
3842

@@ -46,7 +50,7 @@ To set the default list of admins for creating and updating vaults, add the foll
4650
knife[:vault_admins] = [ 'example-alice', 'example-bob', 'example-carol' ]
4751
```
4852

49-
(These values can be overridden on the command line by using `-A`)
53+
You can override these values in the command line by using `-A`.
5054

5155
## Knife Vault CLI
5256

content/tools/knife/install.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,5 +41,5 @@ To install the Knife standalone package, follow these steps:
4141

4242
## Next steps
4343

44-
- [Configure Knife](/configure/#configure-knife)
4544
- [Add a license](/license)
45+
- [Set up Workstation](/set_up)

0 commit comments

Comments
 (0)