Skip to content

Commit 73947ee

Browse files
Sudio TanDeepSecurityOpenSourceSupport
authored andcommitted
DS-17868 Adjust wording after HIE review
1 parent 2fb7f85 commit 73947ee

File tree

8 files changed

+45
-45
lines changed

8 files changed

+45
-45
lines changed

README.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# Chef
22

3-
A cookbook of Chef recipes for the Trend Micro Deep Security Agent. This allows for the easy deployment of the Trend Micro Deep Security Agent as well as taking some common actions from the agent.
3+
A cookbook of Chef recipes for the Trend Micro Deep Security Agent. The recipes allow you to easily deploy the Deep Security Agent and perform a few common agent tasks.
44

55
## Support
66

7-
This is a community project and supported by Trend Micro Deep Security team.
7+
This is a community project that is supported by the Deep Security team.
88

99
Tutorials, feature-specific help, and other information about Deep Security is available from the [Deep Security Help Center](https://help.deepsecurity.trendmicro.com/Welcome.html).
1010

@@ -16,28 +16,28 @@ This repository is also setup for use from [AWS OpsWorks](https://aws.amazon.com
1616

1717
To enable a custom cookbook:
1818

19-
1. From within your stack, click the "Stack Settings" button
20-
1. On the stack setting page, click the blue "Edit" button
21-
1. Slide the "Use custom Chef cookbooks" toggle to "Yes"
22-
1. Set the follow:
19+
1. From within your stack, click the "Stack Settings" button.
20+
1. On the stack setting page, click the blue "Edit" button.
21+
1. Slide the "Use custom Chef cookbooks" toggle to "Yes".
22+
1. Set the input fields as follow:
2323
- "Repository type": *git*
2424
- "Repository URL": *https://github.com/deep-security/chef.git*
25-
1. Click the blue "Save" button
26-
1. On the "Deployments" page for your stack, click the gray "Run Command" button
25+
1. Click the blue "Save" button.
26+
1. On the "Deployments" page for your stack, click the gray "Run Command" button.
2727

28-
If you have existing instances running, do the following;
28+
If you have existing instances running, do the following:
2929

30-
1. Select "Update Custom Cookbooks" from the "Command" drop-down
31-
1. Click the blue, "Update Custom Cookbooks" button to run the command
30+
1. Select "Update Custom Cookbooks" from the "Command" drop-down.
31+
1. Click the blue, "Update Custom Cookbooks" button to run the command.
3232

3333
In the Layers section of the OpsWorks Management Console, for your layer;
3434

35-
1. Click Recipes
36-
1. Under "Custom Recipes", in the "*Configuration*" life cycle enter **deep-security-agent::default**
37-
1. Click the General Settings section
38-
1. In the "Custom JSON" section, enter the necessary recipe settings
35+
1. Click Recipes.
36+
1. Under "Custom Recipes", in the "*Configuration*" life cycle enter **deep-security-agent::default**.
37+
1. Click the General Settings section.
38+
1. In the "Custom JSON" section, enter the necessary recipe settings.
3939

40-
The recipe settings will be along the lines of;
40+
The recipe settings will be along the lines of:
4141

4242
```javascript
4343
{
@@ -60,19 +60,19 @@ The recipes within this repo are now available to you from within your AWS OpsWo
6060

6161
Since AWS OpsWorks only allows one custom cookbook per stack. You have to do a little extra work if you want to incorporate multiple custom cookbooks. Thankfully, git makes this easy.
6262

63-
1. Create a new repo that you will use as your custom cookbook
64-
1. Add each cookbook you want to use as a [```git submodule```](http://git-scm.com/docs/git-submodule)
65-
1. Create a symbolic link to the recipe at the top level of the new repo (```ln -s clone/recipe recipe```)
63+
1. Create a new repo that you will use as your custom cookbook.
64+
1. Add each cookbook you want to use as a [```git submodule```](http://git-scm.com/docs/git-submodule).
65+
1. Create a symbolic link to the recipe at the top level of the new repo (```ln -s clone/recipe recipe```).
6666

6767
This will keep each of the customer cookbook in it's own git repo but allow you to point OpsWorks to one place.
6868

6969
## Contributing
7070

7171
We're always open to PRs from the community. To submit one:
7272

73-
1. Fork the repo
74-
1. Create a new feature branch
75-
1. Make your changes
73+
1. Fork the repo.
74+
1. Create a new feature branch.
75+
1. Make your changes.
7676
1. Submit a PR with an explanation of what/why/caveats/etc.
7777

78-
We'll review and work with you to make sure that the fix gets pushed out quickly. For further help, please contact maintainer email deepsecurityopensource@trendmicro.com.
78+
We'll review and work with you to make sure that the fix gets pushed out quickly. For further help, please contact the Trend Micro open source support team at deepsecurityopensource@trendmicro.com.

deep-security-agent/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ A collection of recipes to help deploy and manage the Trend Micro Deep Security
22

33
## Requirements
44

5-
All of the recipes in this cookbook require a working Trend Micro Deep Security infrastructure. The key component is the Trend Micro Deep Security Manager. The agents (which these recipes help you manage) do the heavy lifting but the manager gives the marching orders.
5+
All of the recipes in this cookbook require a working Deep Security infrastructure. The key component is the Trend Micro Deep Security Manager. The agents (which these recipes help you manage) do the heavy lifting but the manager gives the marching orders.
66

77
There are no specific technical requirements beyond a standard Chef deployment.
88

@@ -13,8 +13,8 @@ There are no specific technical requirements beyond a standard Chef deployment.
1313

1414
Key | Type | Description | Default
1515
----|------|-------------|--------
16-
['dsm_agent_download_hostname'] | String | Hostname of the Deep Security Manager | app.deepsecurity.trendmicro.com
17-
['dsm_agent_download_port'] | Int | The port to connect to the Deep Security Manager on to download the agents. This is typically the same port as the admin web access. | 443
16+
['dsm_agent_download_hostname'] | String | Hostname of the Deep Security Manager. | app.deepsecurity.trendmicro.com
17+
['dsm_agent_download_port'] | Int | The port to connect to the Deep Security Manager to download the agents. This is typically the same port as the one used to access the Deep Security Manager admin interface. | 443
1818
['ignore_ssl_validation'] | Boolean | Whether or not to ignore the SSL certificate validation for agent downloads. Marketplace and software deployments ship with self-signed certificates and require this set to 'true'. | false
1919
['dsm_agent_activation_hostname'] | String | The hostname for the agents to communicate with once deployed. For Marketplace and software deployments this is typically the same hostname as 'dsm_agent_download_hostname'. | agents.deepsecurity.trendmicro.com
2020
['dsm_agent_activation_port'] | Int | The port to use for the agent heartbeat (the regular communication). For Marketplace and software deployments, the default is 4120. | 443
@@ -27,7 +27,7 @@ Key | Type | Description | Default
2727

2828
#### Recipe : deep-security-agent::default
2929

30-
Make sure that you include 'deep-security-agent' in your node's 'run_list'. This will ensure that the Deep Security Agent is installed (it's the default.rb recipe).
30+
Make sure that you include 'deep-security-agent' in your node's 'run_list'. This ensures that the Deep Security Agent is installed (it's the default.rb recipe).
3131

3232
```json
3333
{

deep-security-agent/attributes/default.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
########################
1313

1414
# As you add agents to Deep Security, they are automatically made available for download through
15-
# the same hostname:port as the admin interface. For Marketplace and software deployments, pass
15+
# the same hostname:port as the Deep Security Manager admin interface. For Marketplace and software deployments, pass
1616
# this data through the 'dsm_agent_download_hostname' & 'dsm_agent_download_port' attributes.
1717
default['deep_security_agent']['dsm_agent_download_hostname'] = 'app.deepsecurity.trendmicro.com'
1818
default['deep_security_agent']['dsm_agent_download_port'] = '443'
@@ -21,17 +21,17 @@
2121
# unless you've installed a verifiable SSL certificate.
2222
default['deep_security_agent']['ignore_ssl_validation'] = false
2323

24-
# Deep Security agents activate on a different port then the admin interface. For Marketplace and
24+
# Deep Security agents activate on a different port than the admin interface. For Marketplace and
2525
# software deployments, 'dsm_agent_activation_hostname' is typically the same as 'dsm_agent_download_hostname'
26-
# but 'dsm_agent_activation_port' will be different then 'dsm_agent_download_port'. For Deep Security
26+
# but 'dsm_agent_activation_port' is different than 'dsm_agent_download_port'. For Deep Security
2727
# as a Service, it's the reverse to make it easy to configure only one outbound port.
2828
default['deep_security_agent']['dsm_agent_activation_hostname'] = 'agents.deepsecurity.trendmicro.com'
2929
default['deep_security_agent']['dsm_agent_activation_port'] = '443'
3030

3131
# For multi-tenant deployments of Deep Security (such as Deep Security as a Service), every tenant/organization
3232
# is assigned a unique 'tenant_id' and 'tenant_password' that is only used for agent activation. You can
33-
# find this info from the Support/Help > Deployment Scripts menu option in the admin. Select any agent
34-
# and then check "Activate Agent automatically after installation". This will put the tenant_id and
33+
# find this info from the Support/Help > Deployment Scripts menu in the Deep Security Manager. Select any agent
34+
# and then enable "Activate Agent automatically after installation". This places the tenant_id and
3535
# tenant_password in the script the wizard is building for you.
3636
default['deep_security_agent']['tenant_id'] = nil
3737
default['deep_security_agent']['token'] = nil

deep-security-agent/metadata.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,6 @@
22
maintainer 'Trend Micro'
33
maintainer_email 'deepsecurityopensource@trendmicro.com'
44
license 'All rights reserved'
5-
description 'Installs/Configures the Deep Security agent'
5+
description 'Installs/Configures the Deep Security Agent'
66
long_description IO.read(File.join(File.dirname(__FILE__), 'README.md'))
77
version '1.0.0'

deep-security-agent/recipes/README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,19 @@
22

33
<dl>
44
<dt><a href="default.rb">default.rb</a></dt>
5-
<dd>Deploys the Deep Security agent to the node<sup>1</sup></dd>
5+
<dd>Deploys the Deep Security Agent to the node<sup>1</sup>.</dd>
66
<dt><a href="dsa-check-in-with-manager.rb">dsa-check-in-with-manager.rb</a></dt>
7-
<dd>Asks the Deep Security agent to check in with the Deep Security manager (forced heartbeat)</a></dd>
7+
<dd>Asks the Deep Security Agent to check in with the Deep Security Manager (forced heartbeat).</a></dd>
88
<dt><a href="dsa-create-diagnostic-package.rb">dsa-create-diagnostic-package.rb</a></dt>
9-
<dd>Creates a diagnostic package for the agent and send it to the Deep Security manager</dd>
9+
<dd>Creates a diagnostic package for the agent and send it to the Deep Security Manager.</dd>
1010
<dt><a href="dsa-create-integrity-baseline.rb">dsa-create-integrity-baseline.rb</a></dt>
11-
<dd>Create a baseline for the integrity monitoring engine</dd>
11+
<dd>Create a baseline for the integrity monitoring engine.</dd>
1212
<dt><a href="dsa-recommend-security-policy.rb">dsa-recommend-security-policy.rb</a></dt>
13-
<dd>Scans the node and recommends a security policy based on the current profile of the node</dd>
13+
<dd>Scans the node and recommends a security policy based on the current profile of the node.</dd>
1414
<dt><a href="dsa-scan-for-integrity-changes.rb">dsa-scan-for-integrity-changes.rb</a></dt>
15-
<dd>Scans the node for changes to the filesystem and memory based on the rules running in the integrity monitoring engine</dd>
15+
<dd>Scans the node for changes to the filesystem and memory based on the rules running in the integrity monitoring engine.</dd>
1616
<dt><a href="dsa-scan-for-malware.rb">dsa-scan-for-malware.rb</a></dt>
17-
<dd>Scans the node for malware</dd>
17+
<dd>Scans the node for malware.</dd>
1818
</dl>
1919

2020
<sup>1</sup> Only the [default.rb](default.rb) recipe requires any data to be passed. These requirements are outlined in the [/deep-security-agent/README.md#attributes](../README.md#attributes) section of the main README. All other recipes run without any additional attributes.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
## deep-security-agent-test
22

3-
The cookbook is for DSA deployment verification. For Deep Security Agent deployment in production environment, please refer to <a href="https://github.com/deep-security/chef/tree/master/deep-security-agent">deep-security-agent cookbook</a>.
3+
This cookbook is for Deep Security Agent verification. For an agent deployment in a production environment, please refer to <a href="https://github.com/deep-security/chef/tree/master/deep-security-agent">deep-security-agent cookbook</a>.
44

deep-security-agent/test/cookbooks/deep-security-agent-test/metadata.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
maintainer 'Trend Micro'
33
maintainer_email 'deepsecurityopensource@trendmicro.com'
44
license 'All rights reserved'
5-
description 'Installs/Configures the Deep Security agent'
6-
long_description 'Cookbook for preparation to test deep-security-agent'
5+
description 'Installs/Configures the Deep Security Agent'
6+
long_description 'Cookbook to prepare for testing deep-security-agent'
77
version '1.0.0'
88

deep-security-agent/test/cookbooks/deep-security-agent-test/recipes/default.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
# Copyright 2017, Trend Micro
66

77

8-
# Disable required TTY session for sudo in RHEL and Centos
9-
# "requiretty" will block Kitchen's Inspect from verifying VM status
8+
# Disable required TTY session for sudo in RHEL and Centos.
9+
# "requiretty" blocks Kitchen's Inspect from verifying VM status.
1010
if node[:platform] =~ /redhat/ or node[:platform] =~ /centos/
1111
execute 'Set !require tty for kitchen user' do
1212
action :run

0 commit comments

Comments
 (0)