Manage and distribute cookbooks with Chef on Cloudsmith
Chef is a powerful infrastructure automation platform that lets teams define, configure, and manage IT resources as code using cookbooks and recipes. Cloudsmith gives you a secure, fully managed repository to store and distribute those cookbooks, with fine-grained access controls, vulnerability scanning, and a global CDN to serve artifacts to your nodes reliably wherever they run.
How we support Chef
Why teams integrate Cloudsmith with Chef
Frequently asked questions
You configure a Cloudsmith repository as your Knife target by setting your workspace, repository slug, and an entitlement token or API key in your knife.rb. The Cloudsmith docs provide copy-paste configuration snippets with your credentials pre-filled. Once configured, knife cookbook upload works as normal.
Yes. Chef clients authenticate to Cloudsmith using an entitlement token embedded in the repository URL or passed as a header. Cloudsmith supports both token-based and API key authentication, and tokens can be scoped to read-only access so nodes cannot accidentally modify the repository.
Yes. Cloudsmith scans packages for known vulnerabilities and can enforce OPA Rego policies that quarantine or block packages that fail your security criteria. You can configure the Block Until Scan feature to ensure no cookbook is served to nodes until all security and licence checks have completed.
You can mirror your Chef environment promotion model in Cloudsmith by using separate repositories for development, staging, and production. Cloudsmith's package promotion moves a verified cookbook artifact between repositories without re-uploading, preserving its integrity and provenance trail.
Yes. Cloudsmith upstream proxying lets you cache cookbooks from Chef Supermarket or any external source into your own private repository. Your nodes pull from Cloudsmith, protecting you against upstream outages, rate limits, or packages being unexpectedly removed from the public registry.