[glossary] Remove acronyms [A-C]
- Remove acronym-only entries starting with [A-C]. - Consolodated duplicate entries. - Resolve glossary references Change-Id: I787e3129295e2acd7b3ecb1bbdd03b13ce4b5ca1 Implements: blueprint improve-glossary-usage
This commit is contained in:
parent
ef1d90082a
commit
388350ee08
|
@ -6,7 +6,7 @@ PKI stands for Public Key Infrastructure. Tokens are documents,
|
||||||
cryptographically signed using the X509 standard. In order to work
|
cryptographically signed using the X509 standard. In order to work
|
||||||
correctly token generation requires a public/private key pair. The
|
correctly token generation requires a public/private key pair. The
|
||||||
public key must be signed in an X509 certificate, and the certificate
|
public key must be signed in an X509 certificate, and the certificate
|
||||||
used to sign it must be available as a :term:`Certificate Authority (CA)<CA>`
|
used to sign it must be available as a :term:`Certificate Authority (CA)`
|
||||||
certificate. These files can be generated either using the
|
certificate. These files can be generated either using the
|
||||||
:command:`keystone-manage` utility, or externally generated. The files need to
|
:command:`keystone-manage` utility, or externally generated. The files need to
|
||||||
be in the locations specified by the top level Identity service
|
be in the locations specified by the top level Identity service
|
||||||
|
|
|
@ -18,7 +18,7 @@ directly or through custom plug-ins.
|
||||||
The Orchestration service consists of the following components:
|
The Orchestration service consists of the following components:
|
||||||
|
|
||||||
``heat`` command-line client
|
``heat`` command-line client
|
||||||
A CLI that communicates with the ``heat-api`` to run :term:`AWS`
|
A CLI that communicates with the ``heat-api`` to run AWS
|
||||||
CloudFormation APIs. End developers can directly use the Orchestration
|
CloudFormation APIs. End developers can directly use the Orchestration
|
||||||
REST API.
|
REST API.
|
||||||
|
|
||||||
|
|
|
@ -32,7 +32,7 @@ A
|
||||||
Impassable limits for guest VMs. Settings include total RAM
|
Impassable limits for guest VMs. Settings include total RAM
|
||||||
size, maximum number of vCPUs, and maximum disk size.
|
size, maximum number of vCPUs, and maximum disk size.
|
||||||
|
|
||||||
access control list
|
access control list (ACL)
|
||||||
|
|
||||||
A list of permissions attached to an object. An ACL specifies
|
A list of permissions attached to an object. An ACL specifies
|
||||||
which users or system processes have access to objects. It also
|
which users or system processes have access to objects. It also
|
||||||
|
@ -84,10 +84,6 @@ A
|
||||||
The Compute service provides accounting information through the
|
The Compute service provides accounting information through the
|
||||||
event notification and system usage data facilities.
|
event notification and system usage data facilities.
|
||||||
|
|
||||||
ACL
|
|
||||||
|
|
||||||
See access control list.
|
|
||||||
|
|
||||||
active/active configuration
|
active/active configuration
|
||||||
|
|
||||||
In a high-availability setup with an active/active
|
In a high-availability setup with an active/active
|
||||||
|
@ -361,13 +357,9 @@ A
|
||||||
tolerance. Do not confuse with an OpenStack Compute zone or
|
tolerance. Do not confuse with an OpenStack Compute zone or
|
||||||
cell.
|
cell.
|
||||||
|
|
||||||
AWS
|
|
||||||
|
|
||||||
Amazon Web Services.
|
|
||||||
|
|
||||||
AWS CloudFormation template
|
AWS CloudFormation template
|
||||||
|
|
||||||
AWS CloudFormation allows AWS users to create and manage a
|
AWS CloudFormation allows Amazon Web Services (AWS) users to create and manage a
|
||||||
collection of related resources. The Orchestration service
|
collection of related resources. The Orchestration service
|
||||||
supports a CloudFormation-compatible format (CFN).
|
supports a CloudFormation-compatible format (CFN).
|
||||||
|
|
||||||
|
@ -553,19 +545,6 @@ C
|
||||||
|
|
||||||
.. glossary::
|
.. glossary::
|
||||||
|
|
||||||
CA
|
|
||||||
|
|
||||||
Certificate Authority or Certification Authority. In
|
|
||||||
cryptography, an entity that issues digital certificates. The digital
|
|
||||||
certificate certifies the ownership of a public key by the named
|
|
||||||
subject of the certificate. This enables others (relying parties) to
|
|
||||||
rely upon signatures or assertions made by the private key that
|
|
||||||
corresponds to the certified public key. In this model of trust
|
|
||||||
relationships, a CA is a trusted third party for both the subject
|
|
||||||
(owner) of the certificate and the party relying upon the certificate.
|
|
||||||
CAs are characteristic of many public key infrastructure (PKI)
|
|
||||||
schemes.
|
|
||||||
|
|
||||||
cache pruner
|
cache pruner
|
||||||
|
|
||||||
A program that keeps the Image service VM image cache at or
|
A program that keeps the Image service VM image cache at or
|
||||||
|
@ -582,12 +561,6 @@ C
|
||||||
changed to match a geography nearest the previous
|
changed to match a geography nearest the previous
|
||||||
summit.
|
summit.
|
||||||
|
|
||||||
CADF
|
|
||||||
|
|
||||||
Cloud Auditing Data Federation (CADF) is a
|
|
||||||
specification for audit event data. CADF is
|
|
||||||
supported by OpenStack Identity.
|
|
||||||
|
|
||||||
CALL
|
CALL
|
||||||
|
|
||||||
One of the RPC primitives used by the OpenStack message queue
|
One of the RPC primitives used by the OpenStack message queue
|
||||||
|
@ -664,10 +637,19 @@ C
|
||||||
|
|
||||||
The POSIX-compliant file system provided by Ceph.
|
The POSIX-compliant file system provided by Ceph.
|
||||||
|
|
||||||
certificate authority
|
certificate authority (CA)
|
||||||
|
|
||||||
A simple certificate authority provided by Compute for cloudpipe
|
In cryptography, an entity that issues digital certificates. The digital
|
||||||
VPNs and VM image decryption.
|
certificate certifies the ownership of a public key by the named
|
||||||
|
subject of the certificate. This enables others (relying parties) to
|
||||||
|
rely upon signatures or assertions made by the private key that
|
||||||
|
corresponds to the certified public key. In this model of trust
|
||||||
|
relationships, a CA is a trusted third party for both the subject
|
||||||
|
(owner) of the certificate and the party relying upon the certificate.
|
||||||
|
CAs are characteristic of many public key infrastructure (PKI)
|
||||||
|
schemes.
|
||||||
|
In OpenStack, a simple certificate authority is provided by Compute for
|
||||||
|
cloudpipe VPNs and VM image decryption.
|
||||||
|
|
||||||
Challenge-Handshake Authentication Protocol (CHAP)
|
Challenge-Handshake Authentication Protocol (CHAP)
|
||||||
|
|
||||||
|
@ -717,6 +699,12 @@ C
|
||||||
A person who plans, designs, and oversees the creation of
|
A person who plans, designs, and oversees the creation of
|
||||||
clouds.
|
clouds.
|
||||||
|
|
||||||
|
Cloud Auditing Data Federation (CADF)
|
||||||
|
|
||||||
|
Cloud Auditing Data Federation (CADF) is a
|
||||||
|
specification for audit event data. CADF is
|
||||||
|
supported by OpenStack Identity.
|
||||||
|
|
||||||
cloud computing
|
cloud computing
|
||||||
|
|
||||||
A model that enables access to a shared pool of configurable
|
A model that enables access to a shared pool of configurable
|
||||||
|
@ -782,10 +770,6 @@ C
|
||||||
services. The project name of Clustering service is
|
services. The project name of Clustering service is
|
||||||
senlin.
|
senlin.
|
||||||
|
|
||||||
CMDB
|
|
||||||
|
|
||||||
Configuration Management Database.
|
|
||||||
|
|
||||||
congress
|
congress
|
||||||
|
|
||||||
OpenStack project that provides the Governance service.
|
OpenStack project that provides the Governance service.
|
||||||
|
|
|
@ -186,7 +186,7 @@ Once you mount the disk file, you should be able to access it and treat
|
||||||
it as a collection of normal directories with files and a directory
|
it as a collection of normal directories with files and a directory
|
||||||
structure. However, we do not recommend that you edit or touch any files
|
structure. However, we do not recommend that you edit or touch any files
|
||||||
because this could change the
|
because this could change the
|
||||||
:term:`access control lists (ACLs) <access control list>` that are used
|
:term:`access control lists (ACLs) <access control list (ACL)>` that are used
|
||||||
to determine which accounts can perform what operations on files and
|
to determine which accounts can perform what operations on files and
|
||||||
directories. Changing ACLs can make the instance unbootable if it is not
|
directories. Changing ACLs can make the instance unbootable if it is not
|
||||||
already.
|
already.
|
||||||
|
|
Loading…
Reference in New Issue