Updated from openstack-manuals

[glossary] Remove acronyms [A-C]

- Resolve glossary references

Change-Id: I20893d156f2a5d5eb6d9dd76bd806fe18b008d01
This commit is contained in:
OpenStack Proposal Bot
2016-08-24 04:52:17 +00:00
committed by Emma Foley
parent 7ab38da76e
commit 42db8a7641
6 changed files with 28 additions and 45 deletions

View File

@@ -32,7 +32,7 @@ A
Impassable limits for guest VMs. Settings include total RAM
size, maximum number of vCPUs, and maximum disk size.
access control list
access control list (ACL)
A list of permissions attached to an object. An ACL specifies
which users or system processes have access to objects. It also
@@ -84,10 +84,6 @@ A
The Compute service provides accounting information through the
event notification and system usage data facilities.
ACL
See access control list.
active/active configuration
In a high-availability setup with an active/active
@@ -361,13 +357,9 @@ A
tolerance. Do not confuse with an OpenStack Compute zone or
cell.
AWS
Amazon Web Services.
AWS CloudFormation template
AWS CloudFormation allows AWS users to create and manage a
AWS CloudFormation allows Amazon Web Services (AWS) users to create and manage a
collection of related resources. The Orchestration service
supports a CloudFormation-compatible format (CFN).
@@ -553,19 +545,6 @@ C
.. glossary::
CA
Certificate Authority or Certification Authority. In
cryptography, an entity that issues digital certificates. The digital
certificate certifies the ownership of a public key by the named
subject of the certificate. This enables others (relying parties) to
rely upon signatures or assertions made by the private key that
corresponds to the certified public key. In this model of trust
relationships, a CA is a trusted third party for both the subject
(owner) of the certificate and the party relying upon the certificate.
CAs are characteristic of many public key infrastructure (PKI)
schemes.
cache pruner
A program that keeps the Image service VM image cache at or
@@ -582,12 +561,6 @@ C
changed to match a geography nearest the previous
summit.
CADF
Cloud Auditing Data Federation (CADF) is a
specification for audit event data. CADF is
supported by OpenStack Identity.
CALL
One of the RPC primitives used by the OpenStack message queue
@@ -664,10 +637,19 @@ C
The POSIX-compliant file system provided by Ceph.
certificate authority
certificate authority (CA)
A simple certificate authority provided by Compute for cloudpipe
VPNs and VM image decryption.
In cryptography, an entity that issues digital certificates. The digital
certificate certifies the ownership of a public key by the named
subject of the certificate. This enables others (relying parties) to
rely upon signatures or assertions made by the private key that
corresponds to the certified public key. In this model of trust
relationships, a CA is a trusted third party for both the subject
(owner) of the certificate and the party relying upon the certificate.
CAs are characteristic of many public key infrastructure (PKI)
schemes.
In OpenStack, a simple certificate authority is provided by Compute for
cloudpipe VPNs and VM image decryption.
Challenge-Handshake Authentication Protocol (CHAP)
@@ -717,6 +699,12 @@ C
A person who plans, designs, and oversees the creation of
clouds.
Cloud Auditing Data Federation (CADF)
Cloud Auditing Data Federation (CADF) is a
specification for audit event data. CADF is
supported by OpenStack Identity.
cloud computing
A model that enables access to a shared pool of configurable
@@ -782,10 +770,6 @@ C
services. The project name of Clustering service is
senlin.
CMDB
Configuration Management Database.
congress
OpenStack project that provides the Governance service.

View File

@@ -155,7 +155,7 @@ satisfy the following requirements:
Audit records can be transferred to a remote audit daemon.
* - Discretionary Access Control
- :term:`DAC` restricts access to
file system objects based on :term:`ACL`
file system objects based on :term:`ACL <access control list (ACL)>`
that include the standard UNIX permissions for user,
group and others. Access control mechanisms also protect IPC objects
from unauthorized access.

View File

@@ -50,8 +50,8 @@ created and secured.
With documentation created, security domains called out, and it all
stored where the service teams also have authenticated access, Bob looks
at system management. He outlines a :term:`configuration management
database (CMDB)<CMDB>` that will work with the PXE imaging system so
at system management. He outlines a configuration management
database (CMDB) that will work with the PXE imaging system so
that whenever a device calls in for an image, the MAC address will be
used as the unique identifier in the CMDB entry. A script will report
back on the hardware and software configuration of the system so that

View File

@@ -32,9 +32,8 @@ Hardware inventory
------------------
Clouds without stringent compliance requirements for written documentation
might benefit from having a Configuration Management Database
(:term:`configuration management database (CMDB)<CMDB>`). CMDBs are
normally used for hardware asset tracking and overall life-cycle
might benefit from having a Configuration Management Database (CMDB). CMDBs
are normally used for hardware asset tracking and overall life-cycle
management. By leveraging a CMDB, an organization can quickly identify
cloud infrastructure hardware such as compute nodes, storage nodes, or
network devices. A CMDB can assist in identifying assets that exist on

View File

@@ -42,8 +42,8 @@ is a multi-tenancy enterprise service, the choice to use for L2 isolation in
this environment is to use overlay networking. Another aspect of Bob's cloud is
the self-service aspect where the customer can provision available networking
services as needed. These networking services encompass L2 networks, L3
Routing, Network :term:`ACL` and NAT. It is important that per-tenant quota's
be implemented in this environment.
Routing, Network :term:`ACL <access control list (ACL)>` and NAT. It is
important that per-tenant quota's be implemented in this environment.
An added benefit with utilizing OpenStack Networking is when new advanced
networking services become available, these new features can be easily provided

View File

@@ -36,7 +36,7 @@ the identities of the parties. The core components of PKI are:
End entity
User, process, or system that is the subject of a certificate.
Certification Authority (:term:`CA`)
Certification Authority (:term:`CA <certificate authority (CA)>`)
Defines certificate policies, management, and issuance of certificates.
Registration Authority (RA)