76 Integrations with Chef

View a list of Chef integrations and software that integrates with Chef below. Compare the best Chef integrations as well as features, ratings, user reviews, and pricing of software that integrates with Chef. Here are the current Chef integrations in 2024:

  • 1
    JFrog Platform
    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 2
    Nexus Repository OSS
    Give your teams a single source of truth for every component they use. Optimize build performance and reliability by caching proxies of remote repositories. Deliver universal coverage for all major package types and formats. Install on an unlimited amount of servers for an unlimited amount of users. Store and distribute Maven/Java, npm, NuGet, Helm, Docker, P2, OBR, APT, GO, R, Conan components and more. Manage components from dev through delivery, binaries, containers, assemblies, and finished goods. Awesome support for the Java Virtual Machine (JVM) ecosystem, including Gradle, Ant, Maven, and Ivy. Streamline productivity by sharing components internally. Gain insight into component security, license, and quality issues. Build off-line with remote package availability. Integrate with industry-leading build tools. Nexus Repository Pro capabilities for your binaries and build artifacts across the entire software supply chain.
  • 3
    RunCode

    RunCode

    RunCode

    RunCode offers online developer workspaces, which are environments that allow you to work on code projects in a web browser. These workspaces provide you with a full development environment, including a code editor, a terminal, and access to a range of tools and libraries. They are designed to be easy to use and allow you to get started quickly without the need to set up a local development environment on your own computer.
    Starting Price: $20/month/user
  • 4
    Snow Commander
    Snow Commander is a powerful hybrid cloud management tool that leverages automation to deliver business agility, oversight, and efficiency. This tool enables IT to eliminate cumbersome, manual approval processes and provide end users with a quick, self-service way to access both public and private clouds that won’t slow down the most agile development teams. Increase agility and efficiency with streamlined hybrid cloud management. Snow Commander uses automation to provide end users with quick and easy access to both public and private cloud resources. The comprehensive self-service portal provides IT with the visibility needed to effectively govern resource usage, while self-service provisioning automation capabilities ensure that the most agile development teams don’t miss a beat. A feature-rich workload engine enables change orchestration with cost analytics, governance policy, and automation. It also boasts extensible functionality to empower process transformation.
  • 5
    Nexus Repository Pro
    Manage binaries and build artifacts across your software supply chain. Single source of truth for all of your components, binaries, and build artifacts. Efficiently distribute parts and containers to developers. Deployed at more than 100,000 organizations globally. Store and distribute Maven/Java, npm, NuGet, Helm, Docker, P2, OBR, APT, GO, R, Conan components and more. Manage components from dev through delivery: binaries, containers, assemblies, and finished goods. Advanced support for the Java Virtual Machine (JVM) ecosystem, including Gradle, Ant, Maven, and Ivy. Compatible with popular tools like Eclipse, IntelliJ, Hudson, Jenkins, Puppet, Chef, Docker, and more. Deliver innovation 24x7x365 with high availability. A single source of truth for components used across your entire software development lifecycle including QA, staging, and operations. Easily integrate with existing user and access provisioning systems including LDAP, Atlassian Crowd, and more.
  • 6
    Interlink Software

    Interlink Software

    Interlink Software Solutions

    A single AIOps platform to transform IT operations. Powered by machine learning, Interlink’s AIOps platform brings service-centric visibility and actionable insights to dramatically improve your organization’s defences against damaging outages. Interlink’s unified AIOps platform; data-driven, purpose-built to visualize service availability, automate IT operations processes across your entire technology stack. Mature, highly scalable, security-hardened solutions, proven in some of the largest enterprises in the world. Best of breed approach, leverage the tools you love, avoid vendor lock-in. Low cost, predictable and transparent pricing, rapid time to value. With support that’s second to none, we build real partnerships with our customers - for long-term success. Supercharge your DevOps environment with a single-pane-of-glass service-centric approach to monitoring.
  • 7
    Sweagle

    Sweagle

    Sweagle

    The easy way to control configuration data. Firstly, Sweagle makes it easy to manage all the configuration data from infra, applications and environments into a consolidated data model with full life cycle support. Secondly, Sweagle handles who sees what with intelligent role-based access controls and automatically encrypts secrets or sensitive data - so it never enters a release environment. Last, but not least, with zero effort on your part, you get continuous and automatic validation of configuration data from absolutely any environment, tool or team. It's a fact that no matter the industry, configuration data matters. Sweagle is super successful at bringing configuration data order to complex, global organizations like banking, insurance and telecommunications. Think about it... configuration data is everywhere. If you want to release more quickly, frequently and accurately, you have to manage, test and validate all that data.
  • 8
    Cutover

    Cutover

    Cutover

    Cutover, the leader in work orchestration and observability, is the only platform that provides full organizational visibility into dynamic flows of work, bringing them out of the dark matter of the enterprise to enable teams to move quickly with confidence. Cutover eliminates outdated approaches like static-spreadsheets and weekend calls so teams can accomplish the work quickly and effectively—without the headache. Cutover's solution helps enterprises more effectively plan, orchestrate and audit the human and automated activities that drive critical events, such as technology releases, resilience testing, operational readiness and major incident recovery. A new model of working that orchestrates humans and machine automation in seamless collaboration. Cutover provides a single platform for planning, orchestration, and analysis, updated in real time and visible to all. We believe that people and technology have to work together in order to innovate, succeed, and thrive.
  • 9
    Securonix Security Operations and Analytics
    The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network detection and response (NDR); and security orchestration, automation and response (SOAR) into a complete, end-to-end security operations platform. The Securonix platform delivers unlimited scale, powered by advanced analytics, behavior detection, threat modeling, and machine learning. It increases your security through improved visibility, actionability, and security posture, while reducing management and analyst burden. With native support for thousands of third-party vendors and technology solutions, the Securonix platform simplifies security operations, events, escalations, and remediations. It easily scales from startups to global enterprises while providing the same fast security ROI and ongoing transparent and predictable cost.
  • 10
    Securonix NDR

    Securonix NDR

    Securonix

    Advanced threat monitoring combining network traffic, security logs, and entity context. Identify advanced threats that standalone network traffic analysis (NTA) or security information and event management (SIEM) solutions are not able to detect. Reduce false positives by over 90% by prioritizing threats using Securonix threat chains that span across network and security events. Improve efficiency and lower the operational overhead related to training and enablement when you only need to use a single console and database for all events. Advanced cyberattacks are usually slow and low and involve multiple steps. Detecting such threats requires monitoring and correlating indicators of compromise (IOC) across event sources. Securonix Spotter enables blazing-fast threat hunting using natural language search.
  • 11
    Dqlite

    Dqlite

    Canonical

    Dqlite is a fast, embedded, persistent SQL database with Raft consensus that is perfect for fault-tolerant IoT and Edge devices. Dqlite (“distributed SQLite”) extends SQLite across a cluster of machines, with automatic failover and high-availability to keep your application running. It uses C-Raft, an optimised Raft implementation in C, to gain high-performance transactional consensus and fault tolerance while preserving SQlite’s outstanding efficiency and tiny footprint. C-Raft is tuned to minimize transaction latency. C-Raft and dqlite are both written in C for maximum cross-platform portability. Published under the LGPLv3 license with a static linking exception for maximum compatibility. Includes common CLI pattern for database initialization and voting member joins and departures. Minimal, tunable delay for failover with automatic leader election. Disk-backed database with in-memory options and SQLite transactions.
  • 12
    Multipass

    Multipass

    Canonical

    Get an instant Ubuntu VM with a single command. Multipass can launch and run virtual machines and configure them with cloud-init like a public cloud. Prototype your cloud launches locally for free. The first five minutes with Multipass let you know how easy it is to have a lightweight cloud handy. Let’s launch a few LTS instances, list them, exec a command, use cloud-init and clean up old instances to start. The ”Ubuntu Server CLI cheat sheet“ is your fast path to learning the Linux command line - from basic file management to deploying Kubernetes and OpenStack. Multipass provides a command line interface to launch, manage and generally fiddle about with instances of Linux. The downloading of a minty-fresh image takes a matter of seconds, and within minutes a VM can be up and running. Launch instances of Ubuntu and initialise them with cloud-init metadata like AWS, Azure, Google, IBM and Oracle clouds. Simulate your own cloud deployment on your workstation.
  • 13
    MicroStack

    MicroStack

    Canonical

    Install and run OpenStack on Linux in minutes. Made for developers and great for edge, IoT, and appliances. A full OpenStack in a single snap package. MicroStack is an upstream multi-node OpenStack deployment which can run directly on your workstation. Although made for developers, it is also suitable for edge, IoT and appliances. Grab MicroStack from the Snap Store and get your OpenStack running right away. Get a full OpenStack system running in minutes. Runs safely on your laptop with state of the art isolation. Pure upstream OpenStack delivered to your laptop. Includes all key OpenStack components: Keystone, Nova, Neutron, Glance, and Cinder. All the cool things you probably want to try on a small, standard OpenStack are all built-in. Use MicroStack in your CI/CD pipelines and get on with your day without headaches. MicroStack requires at least 8 GB RAM and a multi-core processor.
  • 14
    Canonical Juju

    Canonical Juju

    Canonical

    Better operators for enterprise apps with a full application graph and declarative integration for both Kubernetes and legacy estate. Juju operator integration allows us to keep each operator as simple as possible, then compose them to create rich application graph topologies that support complex scenarios with a simple, consistent experience and much less YAML. The UNIX philosophy of ‘doing one thing well’ applies to large-scale operations code too, and the benefits of clarity and reuse are exactly the same. Small is beautiful. Juju allows you to adopt the operator pattern for your entire estate, including legacy apps. Model-driven operations dramatically reduce maintenance and operations costs for traditional workloads without re-platforming to K8s. Once charmed, legacy apps become multi-cloud ready, too. The Juju Operator Lifecycle Manager (OLM) uniquely supports both container and machine-based apps, with seamless integration between them.
  • 15
    Mir Display Server
    Whether you want an information kiosk, digital signage display, in-car entertainment stack, or home automation interface, Mir on Ubuntu is your fastest path to deployment. Mir is a system-level component that can be used to unlock next-generation user experiences. It runs on a range of Linux powered devices including traditional desktops, IoT and embedded products. Mir is a replacement for the X window server system, commonly used on Linux desktop devices. It allows device makers and desktop users to have a well-defined, efficient, flexible, and secure platform for their graphical environment. Historically, graphical user interfaces Linux have been powered by the X windowing system. X has a long and successful history and it has served the purposes of both system level and application level UI well for more than 3 decades. However, users nowadays expect a more consistent, integrated and secure user experience than is possible to offer on top of the X windowing system.
  • 16
    MicroK8s

    MicroK8s

    Canonical

    Low-ops, minimal production Kubernetes, for devs, cloud, clusters, workstations, Edge and IoT. MicroK8s automatically chooses the best nodes for the Kubernetes datastore. When you lose a cluster database node, another node is promoted. No admin needed for your bulletproof edge. MicroK8s is small, with sensible defaults that ‘just work’. A quick install, easy upgrades and great security make it perfect for micro clouds and edge computing. Full enterprise support available, with no subscription needed. Optional 24/7 support with 10 year security maintenance. Under the cell tower. On the racecar. On satellites or everyday appliances, MicroK8s delivers the full Kubernetes experience on IoT and micro clouds. Fully containerized deployment with compressed over-the-air updates for ultra-reliable operations. MicroK8s will apply security updates automatically by default, defer them if you want. Upgrade to a newer version of Kubernetes with a single command. It’s really that easy.
  • 17
    Userify

    Userify

    Userify

    Manage team SSH keys across clouds and continents using Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or custom scripts. Userify works smoothly across multiple, geographically isolated clouds and high-latency networks. Hardened. Curve 25519 and bcrypt. PCI-DSS and HIPAA Compliant. AICPA SOC-2 Type 1 certified. Deployed by more than 3,500 companies on every populated continent. Userify SSH Key logins are passwordless: More secure. More convenient. Userify is the only key manager designed to operate on the open Internet. How do you de-provision admins when they leave? With Userify, it's one click. Userify is AICPA SOC-2 Type 1 certified and has achieved PCI-DSS and HIPAA compliance. Userify helps you get compliant with PCI-DSS Requirement 8, even on cloud systems, protect PII, and ban ec2-user forever. Userify helps you get compliant with the HIPAA Security Rule and protect critical healthcare systems and PHI by limiting internal access and authority.
  • 18
    HCL MyCloud

    HCL MyCloud

    HCLSoftware

    HCL MyCloud is a part of Infrastructure Automation and Orchestration offering under HCLSoftware Intelligent Operations ecosystem. It is a hybrid cloud lifecycle management product that empowers organizations to optimally govern, provision, monitor, and manage cloud infrastructure. It integrates data exploration and data visualization in an easy-to-use application, enabling effective analysis and actionable insights for IaaS and PaaS resources. The data-driven recommendations and advisories from MyCloud ensure that enterprise cloud ecosystems are constantly optimized in areas like automation, efficiency, security, and utilization.
  • 19
    Pica8 PICOS
    The one-of-a-kind PICOS open NOS with tightly coupled control planes gives network operators surgical, non-disruptive control of their enterprise applications, deep and dynamic traffic monitoring, and even attack mitigation, all in real time. There’s no better way to implement zero-trust networking and software-defined perimeters than PICOS. Our flagship open network operating system installs on 1G- to 100G-interface open switches from a broad array of Tier 1 manufacturers. This fully featured license offers the most comprehensive support for enterprise features on the market. It includes the Debian Linux distribution, with an unmodified kernel for maximum DevOps programmability. Enterprise Edition also includes AmpCon, an Ansible-based automation framework that couples Zero-Touch Provisioning (ZTP) with the Open Network Install Environment (ONIE) to simplify installation and operation of open network switches across the enterprise.
  • 20
    tCell by Rapid7
    The next-gen cloud WAF and RASP tool that gives you complete visibility for application monitoring and protection. Dramatically reduce the number of false positives and get alerted to malicious activity rather than guessing the impact of random suspicious network events. Protect your application at every level with web server and app server agents so you can identify and block attacks automatically. Take a holistic approach to application security across the SDLC with the combined power and coverage of InsightAppSec and tCell. tCell simplifies the security process by removing the lag between security and DevOps to help your team build the foundation for a true DevSecOps organization. tCell’s analytics aggregate millions of data points from your servers, web browsers, and external threat intelligence sources to give you clear, actionable information in one simple step. tCell’s cloud informs you of the risks your applications are facing.
  • 21
    GenRocket

    GenRocket

    GenRocket

    Enterprise synthetic test data solutions. In order to generate test data that accurately reflects the structure of your application or database, it must be easy to model and maintain each test data project as changes to the data model occur throughout the lifecycle of the application. Maintain referential integrity of parent/child/sibling relationships across the data domains within an application database or across multiple databases used by multiple applications. Ensure the consistency and integrity of synthetic data attributes across applications, data sources and targets. For example, a customer name must always match the same customer ID across multiple transactions simulated by real-time synthetic data generation. Customers want to quickly and accurately create their data model as a test data project. GenRocket offers 10 methods for data model setup. XTS, DDL, Scratchpad, Presets, XSD, CSV, YAML, JSON, Spark Schema, Salesforce.
  • 22
    Opsera

    Opsera

    Opsera

    You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. ‍Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. ‍Contextualized logs for faster resolution and improved auditing and compliance.
  • 23
    Bionic

    Bionic

    Bionic

    Bionic uses an agentless approach to collect all of your application artifacts and provides a deeper level of application visibility that your CSPM tool cannot. Bionic continuously collects your application artifacts and creates an inventory of all of your applications, services, message brokers, and databases. Bionic integrates as a step in CI/CD pipelines and detects critical risks in the application layer and code, so teams can validate security posture in production. Bionic analyzes your code, performing checks for critical CVEs, and provides deeper insights into the blast radius of potential attacks surfaces. Bionic prioritizes code vulnerabilities based on the context of the overall application architecture. Create customized policies to prioritize architecture risk based on your company's security standards.
  • 24
    Commvault Backup & Recovery
    Ensure data availability for all workloads across cloud and on-prem environments. Wherever your data resides, ensure availability via a single interface with Commvault® Backup & Recovery. Say goodbye to costly data loss scenarios, segregated data silos, missing recovery SLAs, and inefficient scaling. Empower your team to do more. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications, including instant recovery of virtual machines. Easily back up, recover, and move data and workloads to/from/within/between clouds. High-performance backups via storage integrations. Built-in ransomware protection including anomaly detection and reporting. Reduce costs with minimal infrastructure requirements in the cloud or on-premises. Optimize cloud vs on-premises location of data and workloads via policy-driven automation.
  • 25
    ShuttleOps

    ShuttleOps

    ShuttleOps

    DevOps teams now have a single platform to build, deploy and manage applications, so they can get fixes, features, and updates to customers quickly and securely. One platform. Ample integrations. Rapid scalability. ShuttleOps is a no-code continuous delivery platform that makes it quick and simple to build, deploy and manage complex distributed applications. Using a simple drag and drop interface, ShuttleOps allows teams and organizations to quickly adopt and scale their DevOps practices. ShuttleOps supports Chef Habitat, Docker Container registries and custom build configurations. That means out-of-the box YAML free deployments, Persistent Volume Claims, Ingress rules, and log management. Define custom workflows with built-in collaboration including acknowledgement and approval gates, as well as real-time notifications to Slack, email and our in-app notification centre.
  • 26
    VMware Fusion Pro
    VMware Fusion gives Mac users the power to run Windows on Mac along with hundreds of other operating systems side by side with Mac applications, without rebooting. Fusion is simple enough for home users and powerful enough for IT professionals, developers and businesses. Running Windows on Mac is only the beginning. VMware Fusion lets you choose from hundreds of supported operating systems, from lesser-known Linux distributions to the latest Windows 10 release, to run side by side with the latest macOS release. Fusion makes it simple to test nearly any OS and app on a Mac. Build and test apps in a sandbox while securely sharing local source files and folders. Fusion Pro now includes a RESTful API to integrate with modern development tools like Docker, Vagrant, Ansible, Chef, and others to fit the power of VMware into today’s Agile and DevOps-oriented production pipelines.