diff --git a/doc/arch-design/specialized/section_desktop_as_a_service_specialized.xml b/doc/arch-design/specialized/section_desktop_as_a_service_specialized.xml
index b15f97501e..085f987100 100644
--- a/doc/arch-design/specialized/section_desktop_as_a_service_specialized.xml
+++ b/doc/arch-design/specialized/section_desktop_as_a_service_specialized.xml
@@ -25,7 +25,7 @@
example:
- Boot storms - What happens when hundreds or
+ Boot storms: What happens when hundreds or
thousands of users log in during shift changes,
affects the storage design.
@@ -39,19 +39,21 @@
Broker
- The Connection Broker is a central component of the
- architecture that determines which Remote Desktop Host will be
+ The connection broker is a central component of the
+ architecture that determines which remote desktop host will be
assigned or connected to the user. The broker is often a
full-blown management product allowing for the automated
- deployment and provisioning of Remote Desktop Hosts.
+ deployment and provisioning of remote desktop hosts.
Possible solutions
- There a number of commercial products available today that
+
+ There are a number of commercial products available today that
provide such a broker solution but nothing that is native in
- the OpenStack project. There of course is also the option of
- not providing a broker and managing this manually - but this
- would not suffice as a large scale, enterprise
- solution.
+ the OpenStack project. Not providing a broker is also
+ an option, but managing this manually would not suffice as a
+ large scale, enterprise solution.
+
+
Diagram
diff --git a/doc/arch-design/specialized/section_hardware_specialized.xml b/doc/arch-design/specialized/section_hardware_specialized.xml
index d7571a8e66..7951da3866 100644
--- a/doc/arch-design/specialized/section_hardware_specialized.xml
+++ b/doc/arch-design/specialized/section_hardware_specialized.xml
@@ -22,21 +22,25 @@
work.SolutionsIn order to provide cryptography offloading to a set of
- instances, it is possible to use Glance configuration options
- to assign the cryptography chip to a device node in the guest.
- The documentation at
- http://docs.openstack.org/cli-reference/content/chapter_cli-glance-property.html
- contains further information on configuring this solution, but
- it allows all guests using the configured images to access the
- hypervisor cryptography device.
+ instances, it is possible to use Image Service configuration
+ options to assign the cryptography chip to a device node in
+ the guest. The OpenStack Command Line
+ Reference contains further information on
+ configuring this solution in the chapter Image
+ Service property keys , but it allows all guests using
+ the configured images to access the hypervisor cryptography
+ device.
If direct access to a specific device is required, it can be
+
dedicated to a single instance per hypervisor through the use
of PCI pass-through. The OpenStack administrator needs to
define a flavor that specifically has the PCI device in order
to properly schedule instances. More information regarding PCI
pass-through, including instructions for implementing and
- using it, is available at
- https://wiki.openstack.org/wiki/Pci_passthrough#How_to_check_PCI_status_with_PCI_api_patches.
+ using it, is available at https://wiki.openstack.org/wiki/Pci_passthrough.
+
diff --git a/doc/arch-design/specialized/section_introduction_specialized.xml b/doc/arch-design/specialized/section_introduction_specialized.xml
index 6fd4b19545..e1929644a0 100644
--- a/doc/arch-design/specialized/section_introduction_specialized.xml
+++ b/doc/arch-design/specialized/section_introduction_specialized.xml
@@ -13,7 +13,7 @@
can't be neatly categorized into one of the other major
sections. This section discusses some of these unique use
cases with some additional details and design considerations
- for each use case.
+ for each use case:
Specialized Networking: This describes running
diff --git a/doc/arch-design/specialized/section_multi_hypervisor_specialized.xml b/doc/arch-design/specialized/section_multi_hypervisor_specialized.xml
index c8310f92b9..a96e1e2b79 100644
--- a/doc/arch-design/specialized/section_multi_hypervisor_specialized.xml
+++ b/doc/arch-design/specialized/section_multi_hypervisor_specialized.xml
@@ -51,7 +51,7 @@
a specific host aggregate using the metadata of the image, the
VMware host aggregate compute nodes communicate with vCenter
which then requests that the instance be scheduled to run on
- an ESXi hypervisor. As of the Icehouse release,this
+ an ESXi hypervisor. As of the Icehouse release, this
functionality requires that VMware Distributed Resource
Scheduler (DRS) be enabled on a cluster and set to "Fully
Automated".
diff --git a/doc/arch-design/specialized/section_networking_specialized.xml b/doc/arch-design/specialized/section_networking_specialized.xml
index 0820715e47..afa9c4bcca 100644
--- a/doc/arch-design/specialized/section_networking_specialized.xml
+++ b/doc/arch-design/specialized/section_networking_specialized.xml
@@ -19,7 +19,7 @@
layer 2 listeners.Possible solutions
- Deploying an OpenStack installation using Neutron with a
+ Deploying an OpenStack installation using OpenStack Networking with a
provider network will allow direct layer 2 connectivity to an
upstream networking device. This design provides the layer 2
connectivity required to communicate via Intermediate
diff --git a/doc/arch-design/specialized/section_openstack_on_openstack_specialized.xml b/doc/arch-design/specialized/section_openstack_on_openstack_specialized.xml
index 6b62f00219..8eda69022a 100644
--- a/doc/arch-design/specialized/section_openstack_on_openstack_specialized.xml
+++ b/doc/arch-design/specialized/section_openstack_on_openstack_specialized.xml
@@ -1,4 +1,8 @@
+
+%openstack;
+]>
+ available OpenStack Compute resources, whether public or
+ private.ChallengesThe network aspect of deploying a nested cloud is the most
complicated aspect of this architecture. When using VLANs,
@@ -42,10 +46,12 @@
deploying additional stacks will be a trivial thing and can be
performed in an automated fashion.The OpenStack-On-OpenStack project (TripleO) is addressing
- this issue - although at the current time the project does not
- provide comprehensive coverage for the nested stacks. More
- information can be found at
- https://wiki.openstack.org/wiki/TripleO.
+ this issue—although at the current time the project does
+ not provide comprehensive coverage for the nested stacks. More
+ information can be found at https://wiki.openstack.org/wiki/TripleO.
+
+ Possible solutions: hypervisorIn the case of running TripleO, the underlying OpenStack
@@ -56,7 +62,8 @@
purposes, and performance would not be a critical factor, QEMU
can be utilized instead. It is also possible to run a KVM
hypervisor in an instance
- (http://davejingtian.org/2014/03/30/nested-kvm-just-for-fun/),
+ (see http://davejingtian.org/2014/03/30/nested-kvm-just-for-fun/),
though this is not a supported configuration, and could be a
complex solution for such a use case.Diagram
diff --git a/doc/arch-design/specialized/section_software_defined_networking_specialized.xml b/doc/arch-design/specialized/section_software_defined_networking_specialized.xml
index 39130b10d4..0df094d7a6 100644
--- a/doc/arch-design/specialized/section_software_defined_networking_specialized.xml
+++ b/doc/arch-design/specialized/section_software_defined_networking_specialized.xml
@@ -5,8 +5,8 @@
version="5.0"
xml:id="software-defined-networking-sdn">
- Software Defined Networking (SDN)
- Software Defined Networking is the separation of the data
+ Software Defined Networking
+ Software Defined Networking (SDN) is the separation of the data
plane and control plane. SDN has become a popular method of
managing and controlling packet flows within networks. SDN
uses overlays or directly controlled layer 2 devices to