From 6917e73990c050b2e0d09e3452724791a24078e7 Mon Sep 17 00:00:00 2001 From: Andreas Jaeger Date: Fri, 14 Mar 2014 22:40:56 +0100 Subject: [PATCH] O'Reilly Edits for the glossary Edits done for the Operations Guide, will be copied over after review. This uses now "back-end" as adjective and "back end" as noun. Change-Id: I2b8384a80fdd17e88f214bdf0ac47d42264bf19f --- doc/glossary/glossary-terms.xml | 356 +++++++++++++++++--------------- 1 file changed, 192 insertions(+), 164 deletions(-) diff --git a/doc/glossary/glossary-terms.xml b/doc/glossary/glossary-terms.xml index cc1e401ca2..bf883c3ec8 100644 --- a/doc/glossary/glossary-terms.xml +++ b/doc/glossary/glossary-terms.xml @@ -1,4 +1,9 @@ + + +]> + @@ -36,16 +41,23 @@ access control list - A list of permissions attached to an object. An ACL specifies which users or system processes have access to objects. It also -defines which operations can be performed on specified objects. -Each entry in a typical ACL specifies a subject and an operation. For instance, ACL entry, (Alice, delete), for a file gives Alice permission to delete the file. + + A list of permissions attached to an object. An ACL + specifies which users or system processes have + access to objects. It also defines which operations + can be performed on specified objects. Each entry + in a typical ACL specifies a subject and an + operation. For instance, the ACL entry (Alice, + delete) for a file gives Alice permission to + delete the file. + access key Alternative term for an Amazon EC2 access key. - See EC2 Access key. + See EC2 access key. @@ -126,7 +138,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Active Directory - Authentication and Identity Service by + Authentication and identity service by Microsoft, based on LDAP. Supported in OpenStack. @@ -134,7 +146,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, active/passive configuration - In a high availability setup with an + In a high-availability setup with an active/passive configuration, systems are set up to bring additional resources online to replace those that have failed. @@ -155,7 +167,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, A subset of API calls that are accessible to authorized administrators and are generally not - accessible to end users or the public internet, + accessible to end users or the public Internet. They can exist as a separate service (keystone) or can be a subset of another API (nova). @@ -197,7 +209,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, allocate - The process of taking floating IP address from + The process of taking a floating IP address from the address pool so it can be associated with a fixed IP on a guest VM instance. @@ -223,20 +235,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Supported by Image Service. - - AMQP - - Advanced Message Queue Protocol. An open - Internet protocol for reliably sending and - receiving messages. It enables building a diverse, - coherent messaging ecosystem. - - Anvil A project that ports the shell script-based - project named devstack to Python. + project named DevStack to Python. @@ -274,7 +277,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, The daemon, worker, or service that a client communicates with to access an API. API endpoints - can provide any number of services such as + can provide any number of services, such as authentication, sales data, performance metrics, Compute VM commands, census data, and so on. @@ -493,7 +496,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, auto declare - A Compute RabbitMQ setting that determines if a + A Compute RabbitMQ setting that determines whether a message exchange is automatically created when the program starts. @@ -517,11 +520,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, B - back-end + back end Interactions and processes that are obfuscated from the user, such as Compute volume mount, data - transmission to an isCSI target by a daemon, or + transmission to an iSCSI target by a daemon, or Object Storage object integrity checks. @@ -540,7 +543,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, back-end store The persistent data store used to save and - retrieve a information for a service, such as lists of + retrieve information for a service, such as lists of Object Storage objects, current state of guest VMs, lists of user names, and so on. Also, the method that the Image Service uses to get and store VM images. @@ -596,7 +599,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - bit-per-second (BPS) + bits-per-second (BPS) The universal measurement of how quickly data is transferred from place to place. @@ -669,7 +672,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, builder file Contains configuration information that Object - Storage uses to reconfigure a ring or recreate it from + Storage uses to reconfigure a ring or to re-create it from scratch after a serious failure. @@ -726,7 +729,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, An OpenStack grouped release of projects that came out in the spring of 2011. It included Compute (nova), Object Storage (swift), and the - Image service (glance). + Image Service (glance). @@ -748,8 +751,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, capacity cache - A Compute back end database table that contains - the current workload, amount of free RAM, + A Compute back-end database table that contains + the current workload, amount of free RAM, and number of VMs running on each host. Used to determine on which VM a host starts. @@ -939,7 +942,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, cloud controller node - A node that runs network, volume, API, scheduler + A node that runs network, volume, API, scheduler, and image services. Each service may be broken out into separate nodes for scalability or availability. @@ -969,7 +972,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, A package commonly installed in VM images that performs initialization of an instance after boot using information that it retrieves from the - metadata service such as the SSH public key and + metadata service, such as the SSH public key and user data. @@ -1103,7 +1106,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, In Compute, conductor is the process that proxies database requests from the compute process. Using - conductor improves security as compute nodes do not + conductor improves security because compute nodes do not need direct access to the database. @@ -1216,12 +1219,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, credentials - Data that is only known to or accessible by a - user that is used to verify the user is who they - say they are and presented to the server during - authentication. Examples include a password, - secret key, digital certificate, fingerprint, and - so on. + + Data that is only known to or accessible by a user + and used to verify that the user is who they say + they are. Credentials are presented to the server + during authentication. Examples include a password, + secret key, digital certificate, fingerprint, and so + on. @@ -1334,7 +1338,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, The process of finding duplicate data at the disk block, file, and/or object level to minimize - storage use, currently unsupported within + storage use—currently unsupported within OpenStack. @@ -1364,16 +1368,18 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, delayed delete - An option within Image Service so that rather than - immediately delete an image, it is deleted after a - pre-defined number of seconds. + + An option within Image Service so that an image is + deleted after a predefined number of seconds instead + of immediately. + delivery mode Setting for the Compute RabbitMQ message delivery - mode, can be set to either transient or + mode; can be set to either transient or persistent. @@ -1422,15 +1428,16 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, DHCP - Dynamic Host Configuration Protocol. A network - protocol that configures devices that are - connected to a network so they can communicate on - that network by using the Internet Protocol (IP). - The protocol is implemented in a client-server - model where DHCP clients request configuration - data such as, an IP address, a default route, and - one or more DNS server addresses from a DHCP - server. + + Dynamic Host Configuration Protocol. A network + protocol that configures devices that are connected + to a network so that they can communicate on that + network by using the Internet Protocol (IP). The + protocol is implemented in a client-server model + where DHCP clients request configuration data such + as, an IP address, a default route, and one or more + DNS server addresses from a DHCP server. + @@ -1440,7 +1447,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, OpenStack that came out in the fall of 2011, the fourth release of OpenStack. It included Compute (nova 2011.3), Object Storage (swift 1.4.3), and - the Image service (glance). + the Image Service (glance). @@ -1480,7 +1487,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, disk encryption The ability to encrypt data at the file system, - disk partition or whole disk level. Supported + disk partition, or whole-disk level. Supported within Compute VMs. @@ -1550,7 +1557,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, In Compute, the support that enables associating DNS entries with floating IP addresses, nodes, or - cells so host names are consistent across + cells so that hostnames are consistent across reboots. @@ -1614,9 +1621,9 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Dynamic HyperText Markup Language (DHTML) - Pages that use HTML, - JavaScript, and CCS to enable users to interact - with a web page or show simple animation. + Pages that use HTML, JavaScript, and Cascading + Style Sheets to enable users to interact with a web + page or show simple animation. @@ -1671,7 +1678,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, EC2 secret key Used along with an EC2 access key when - communicating with the Compute EC2 API, is used to + communicating with the Compute EC2 API; used to digitally sign each request. @@ -1706,8 +1713,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, endpoint template A list of URL and port number endpoints that - indicate where a service, such as object storage, - compute, identity, and so on, can be + indicate where a service, such as Object Storage, + Compute, Identity, and so on, can be accessed. @@ -1716,7 +1723,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Any piece of hardware or software that wants to connect to the network services provided by - Networking, the Network Connectivity service. An + Networking, the network connectivity service. An entity can make use of Networking by implementing a VIF. @@ -1829,9 +1836,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, exclusive queue - Connected to by a direct consumer in RabbitMQ / - Compute, the message can only be consumed by the - current connection. + + Connected to by a direct consumer in + RabbitMQ—Compute, the message can be consumed + only by the current connection. + @@ -1847,10 +1856,12 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, extension - Alternative term for a Compute API extension or - plug-in. In the context of Identity Service this is a call - that is specific to the implementation, such as - adding support for OpenID. + + Alternative term for an API extension or + plug-in. In the context of Identity Service, this is + a call that is specific to the implementation, such + as adding support for OpenID. + @@ -1925,7 +1936,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Used to restrict communications between hosts and/or nodes, implemented in Compute using iptables, - arptables, ip6tables and etables. + arptables, ip6tables, and etables. @@ -1941,9 +1952,9 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, fixed IP address An IP address that is associated with the same - instance each time that instance boots, generally + instance each time that instance boots, is generally not accessible to end users or the public - internet, used for management of the + Internet, and used for management of the instance. @@ -2001,7 +2012,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, floating IP address An IP address that a project can associate - with a VM so the instance has the same public IP + with a VM so that the instance has the same public IP address each time that it boots. You create a pool of floating IP addresses and assign them to instances as they are launched to maintain a @@ -2016,8 +2027,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, OpenStack that came out in the fall of 2012, the sixth release of OpenStack. It includes Compute (nova), Object Storage (swift), Identity - (keystone), Networking (neutron), Image service - (glance) and Volumes or Block Storage + (keystone), Networking (neutron), Image Service + (glance), and Volumes or Block Storage (cinder). @@ -2030,9 +2041,9 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - front-end + frontend - The point where a user interacts with a service, + The point where a user interacts with a service; can be an API endpoint, the horizon dashboard, or a command-line tool. @@ -2110,8 +2121,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Green Threads - The cooperative threading model used by Python, - reduces race conditions, and only context switches + The cooperative threading model used by Python; + reduces race conditions and only context switches when specific library calls are made. Each OpenStack service is its own thread. @@ -2253,7 +2264,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - HyperText Transfer Protocol (HTTP) + Hypertext Transfer Protocol (HTTP) The protocol that tells browsers where to go to find information. @@ -2263,7 +2274,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Hypertext Transfer Protocol Secure (HTTPS) - Encrypted HTTP communications using SSL or TLS, + Encrypted HTTP communications using SSL or TLS; most OpenStack API endpoints and many inter-component communications support HTTPS communication. @@ -2324,10 +2335,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - Identity back-end + Identity back end The source used by Identity Service to retrieve user - information an OpenLDAP server for example. + information; an OpenLDAP server for example. @@ -2386,7 +2397,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, image ID - Combination of URI and UUID used to access + Combination of a URI and UUID used to access Image Service VM images through the image API. @@ -2477,7 +2488,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, instance A running VM, or a VM in a known state such as - suspended that can be used like a hardware server. + suspended, that can be used like a hardware server. @@ -2592,7 +2603,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, as different Netfilter modules) and the chains and rules it stores. Different kernel modules and programs are currently used for different - protocols; iptables applies to IPv4, ip6tables to + protocols: iptables applies to IPv4, ip6tables to IPv6, arptables to ARP, and ebtables to Ethernet frames. Requires root privilege to manipulate. @@ -2750,7 +2761,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, load balancer - A load balancer is a logical device which + A load balancer is a logical device that belongs to a cloud account. It is used to distribute workloads between multiple back-end systems or services, based on the criteria defined @@ -2786,7 +2797,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, management network A network segment used for administration, not - accessible to the public internet. + accessible to the public Internet. @@ -2905,7 +2916,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Modular Layer 2 (ML2) neutron plug-in Can concurrently use multiple - layer 2 networking technologies, such as 802.1Q and + layer-2 networking technologies, such as 802.1Q and VXLAN, in Networking. @@ -2990,10 +3001,12 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, network controller - A Compute daemon that orchestrates the network - configuration of nodes including includes IP - addresses, VLANs, bridging, and manages routing - for both public and private networks. + + A Compute daemon that orchestrates the network + configuration of nodes, including IP addresses, + VLANs, and bridging. Also manages routing for both + public and private networks. + @@ -3028,7 +3041,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, network segment - Represents a virtual, isolated OSI layer 2 + Represents a virtual, isolated OSI layer-2 subnet in Networking. @@ -3176,7 +3189,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, object - A BLOB of data held by Object Storage, can be in any + A BLOB of data held by Object Storage; can be in any format. @@ -3251,9 +3264,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, object versioning - Allows a user to set a flag on an Object Storage container - so all objects within the container are - versioned. + + Allows a user to set a flag on an Object Storage + container so that all objects within the container + are versioned. @@ -3300,10 +3314,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, OpenStack is a cloud operating system that controls large pools of compute, storage, and networking - resources throughout a datacenter, all managed through + resources throughout a data center, all managed through a dashboard that gives administrators control while empowering their users to provision resources through - a web interface. OpenStack is an Open Source project licensed + a web interface. OpenStack is an open source project licensed under the Apache License 2.0. @@ -3334,9 +3348,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, orphan - In the context of Object Storage this is a process that - is not terminated after an upgrade, restart, or - reload of the service. + + In the context of Object Storage, this is a process + that is not terminated after an upgrade, restart, or + reload of the service. + @@ -3355,9 +3371,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, partition - A unit of storage within Object Storage used to store - objects, exists on top of devices, replicated for - fault tolerance. + + A unit of storage within Object Storage used to + store objects. It exists on top of devices and is, + replicated for fault tolerance. + @@ -3378,7 +3396,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, pause A VM state where no changes occur (no changes in - memory, network communications stop, etc), the VM + memory, network communications stop, etc); the VM is frozen but not shut down. @@ -3394,7 +3412,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, persistent message A message that is stored both in memory and on - disk, the message is not lost after a failure or + disk. The message is not lost after a failure or restart. @@ -3408,9 +3426,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, personality file - A file used to customize a Compute instance, can be - used to inject SSH keys or a specific network - configuration. + + A file used to customize a Compute instance. It can + be used to inject SSH keys or a specific network + configuration. + @@ -3437,15 +3457,17 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, policy service - Component of Identity Service that provides a rule - management interface and a rule based - authorization engine. + + Component of Identity Service that provides a + rule-management interface and a rule-based + authorization engine. + port - A virtual network port within Networking, VIFs / + A virtual network port within Networking; VIFs / vNICs are connected to a port. @@ -3475,7 +3497,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, An IP address used for management and administration, not available to the public - internet. + Internet. @@ -3503,7 +3525,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, project ID - User defined alpha-numeric string in Compute, the + User-defined alpha-numeric string in Compute; the name of a project. @@ -3531,7 +3553,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, proxy server Users of Object Storage interact with the service through - the proxy server which in-turn looks up the + the proxy server, which in-turn looks up the location of the requested data within the ring and returns the results to the user. @@ -3539,8 +3561,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, public API - An API endpoint used for both service to service - communication and end user interactions. + An API endpoint used for both service-to-service + communication and end-user interactions. @@ -3571,7 +3593,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Puppet - An operating system configuration management + An operating system configuration-management tool supported by OpenStack. @@ -3596,7 +3618,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Qpid - Message queue software supported by OpenStack, + Message queue software supported by OpenStack; an alternative to RabbitMQ. @@ -3604,7 +3626,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, quarantine If Object Storage finds objects, containers, or accounts - that are corrupt they are placed in this state, + that are corrupt, they are placed in this state, are not replicated, cannot be read by clients, and a correct copy is re-replicated. @@ -3689,14 +3711,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, raw One of the VM image disk formats supported by - Image Service, an unstructured disk image. + Image Service; an unstructured disk image. rebalance The process of distributing Object Storage partitions - across all drives in the ring, used during initial + across all drives in the ring; used during initial ring creation and after ring reconfiguration. @@ -3711,7 +3733,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, power cycling the server. The virtualization platform should ensure that the reboot action has completed successfully even in cases in which the - underlying domain/vm is paused or halted/stopped. + underlying domain/VM is paused or halted/stopped. @@ -3768,7 +3790,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, region - A Discrete OpenStack environment with dedicated API + A discrete OpenStack environment with dedicated API endpoints that typically shares only the Identity Service (keystone) with other regions. @@ -3808,7 +3830,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Provides data redundancy and fault tolerance by creating copies of Object Storage objects, accounts, and - containers so they are not lost when the + containers so that they are not lost when the underlying storage fails. @@ -3890,7 +3912,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Role Based Access Control (RBAC) Provides a predefined list of actions that the - user can perform such as start or stop VMs, reset + user can perform, such as start or stop VMs, reset passwords, and so on. Supported in both Identity Service and Compute and can be configured using the horizon dashboard. @@ -3932,8 +3954,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, routing key The Compute direct exchanges, fanout exchanges, and - topic exchanges use this to determine how to - process a message, processing varies depending on + topic exchanges use this key to determine how to + process a message; processing varies depending on exchange type. @@ -3980,17 +4002,21 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, S3 - Object storage service by Amazon, similar in - function to Object Storage, can act as a back-end store for - Image Service VM images. + + Object storage service by Amazon; similar in + function to Object Storage, it can act as a back-end + store for Image Service VM images. + sahara - OpenStack project that provides a scalable data - processing stack and associated management interfaces. - + + OpenStack project that provides a scalable + data-processing stack and associated management + interfaces. + @@ -4011,14 +4037,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, scrubber - Checks for and deletes unused VM, the component + Checks for and deletes unused VMs; the component of Image Service that implements delayed delete. secret key - String of text only known by the user, used + String of text known only by the user; used along with an access key to make requests to the Compute API. @@ -4042,7 +4068,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, segmented object An Object Storage large object that has been broken up - into pieces, the re-assembled object is called a + into pieces. The re-assembled object is called a concatenated object. @@ -4052,7 +4078,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Computer that provides explicit services to the client software running on that system, often managing a variety of computer operations. - A server is a VM instance in the compute system. + A server is a VM instance in the Compute system. Flavor and image are requisite elements when creating a server. @@ -4129,7 +4155,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, session persistence - A feature of the load balancing service. It + A feature of the load-balancing service. It attempts to force subsequent connections to a service to be redirected to the same node as long as it is online. @@ -4169,15 +4195,15 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, can share one or more public IPs with any other server in the group. With the exception of the first server in a shared IP group, servers must be - launched into shared IP groups. A server may only - be a member of one shared IP group. + launched into shared IP groups. A server may + be a member of only one shared IP group. shared storage Block storage that is simultaneously accessible - by multiple clients. For example, NFS. + by multiple clients, for example, NFS. @@ -4212,7 +4238,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, SmokeStack Runs automated tests against the core OpenStack - API, written in Rails. + API; written in Rails. @@ -4255,7 +4281,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, spread-first scheduler The Compute VM scheduling algorithm that attempts - to start new VM on the host with the least amount + to start a new VM on the host with the least amount of load. @@ -4295,17 +4321,17 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - storage back-end + storage back end The method that a service uses for persistent - storage such as iSCSI, NFS, or local disk. + storage, such as iSCSI, NFS, or local disk. storage node An Object Storage node that provides container services, - account services, and object services, controls + account services, and object services; controls the account databases, container databases, and object storage. @@ -4315,13 +4341,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, A XenAPI component that provides a pluggable interface to support a wide variety of persistent - storage back-ends. + storage back ends. - storage manager back-end + storage manager back end - A persistent storage method supported by XenAPI + A persistent storage method supported by XenAPI, such as iSCSI or NFS. @@ -4376,7 +4402,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, swawth An authentication and authorization service for - Object Storage, implemented through WSGI middleware, uses + Object Storage, implemented through WSGI middleware; uses Object Storage itself as the persistent backing store. @@ -4503,7 +4529,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, tenant ID Unique ID assigned to each tenant within - the Identity Service, the project IDs map to the + the Identity Service. The project IDs map to the tenant IDs. @@ -4526,7 +4552,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, tombstone Used to mark Object Storage objects that have been - deleted, ensures the object is not updated on + deleted; ensures that the object is not updated on another node after it has been deleted. @@ -4534,7 +4560,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, topic publisher A process that is created when a RPC call is - executed, used to push the message to the topic + executed; used to push the message to the topic exchange. @@ -4548,7 +4574,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, transaction ID - Unique ID assigned to each Object Storage request, used + Unique ID assigned to each Object Storage request; used for debugging and tracing. @@ -4613,8 +4639,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, user - In Identity Service each user is associated with one or - more tenants, and in Compute they can be associated + In Identity Service, each user is associated with one or + more tenants, and in Compute can be associated with roles, projects, or both. @@ -4731,9 +4757,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, virtual switch (vSwitch) - Software that runs on a host or node and - provides the features and functions of a hardware - based network switch. + + Software that runs on a host or node and provides + the features and functions of a hardware-based + network switch. + @@ -4751,7 +4779,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, VLAN manager - A Compute component that provides dnsmasq, radvd, + A Compute component that provides dnsmasq and radvd and sets up forwarding to and from cloudpipe instances. @@ -4814,7 +4842,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Disk-based data storage generally represented as an iSCSI target with a file system that supports - extended attributes, can be persistent or + extended attributes; can be persistent or ephemeral.