Updated from openstack-manuals
[glossary] Remove acronyms [A-C] - Resolve glossary references Change-Id: I20893d156f2a5d5eb6d9dd76bd806fe18b008d01
This commit is contained in:
committed by
Emma Foley
parent
7ab38da76e
commit
42db8a7641
@@ -32,7 +32,7 @@ A
|
||||
Impassable limits for guest VMs. Settings include total RAM
|
||||
size, maximum number of vCPUs, and maximum disk size.
|
||||
|
||||
access control list
|
||||
access control list (ACL)
|
||||
|
||||
A list of permissions attached to an object. An ACL specifies
|
||||
which users or system processes have access to objects. It also
|
||||
@@ -84,10 +84,6 @@ A
|
||||
The Compute service provides accounting information through the
|
||||
event notification and system usage data facilities.
|
||||
|
||||
ACL
|
||||
|
||||
See access control list.
|
||||
|
||||
active/active configuration
|
||||
|
||||
In a high-availability setup with an active/active
|
||||
@@ -361,13 +357,9 @@ A
|
||||
tolerance. Do not confuse with an OpenStack Compute zone or
|
||||
cell.
|
||||
|
||||
AWS
|
||||
|
||||
Amazon Web Services.
|
||||
|
||||
AWS CloudFormation template
|
||||
|
||||
AWS CloudFormation allows AWS users to create and manage a
|
||||
AWS CloudFormation allows Amazon Web Services (AWS) users to create and manage a
|
||||
collection of related resources. The Orchestration service
|
||||
supports a CloudFormation-compatible format (CFN).
|
||||
|
||||
@@ -553,19 +545,6 @@ C
|
||||
|
||||
.. glossary::
|
||||
|
||||
CA
|
||||
|
||||
Certificate Authority or Certification Authority. In
|
||||
cryptography, an entity that issues digital certificates. The digital
|
||||
certificate certifies the ownership of a public key by the named
|
||||
subject of the certificate. This enables others (relying parties) to
|
||||
rely upon signatures or assertions made by the private key that
|
||||
corresponds to the certified public key. In this model of trust
|
||||
relationships, a CA is a trusted third party for both the subject
|
||||
(owner) of the certificate and the party relying upon the certificate.
|
||||
CAs are characteristic of many public key infrastructure (PKI)
|
||||
schemes.
|
||||
|
||||
cache pruner
|
||||
|
||||
A program that keeps the Image service VM image cache at or
|
||||
@@ -582,12 +561,6 @@ C
|
||||
changed to match a geography nearest the previous
|
||||
summit.
|
||||
|
||||
CADF
|
||||
|
||||
Cloud Auditing Data Federation (CADF) is a
|
||||
specification for audit event data. CADF is
|
||||
supported by OpenStack Identity.
|
||||
|
||||
CALL
|
||||
|
||||
One of the RPC primitives used by the OpenStack message queue
|
||||
@@ -664,10 +637,19 @@ C
|
||||
|
||||
The POSIX-compliant file system provided by Ceph.
|
||||
|
||||
certificate authority
|
||||
certificate authority (CA)
|
||||
|
||||
A simple certificate authority provided by Compute for cloudpipe
|
||||
VPNs and VM image decryption.
|
||||
In cryptography, an entity that issues digital certificates. The digital
|
||||
certificate certifies the ownership of a public key by the named
|
||||
subject of the certificate. This enables others (relying parties) to
|
||||
rely upon signatures or assertions made by the private key that
|
||||
corresponds to the certified public key. In this model of trust
|
||||
relationships, a CA is a trusted third party for both the subject
|
||||
(owner) of the certificate and the party relying upon the certificate.
|
||||
CAs are characteristic of many public key infrastructure (PKI)
|
||||
schemes.
|
||||
In OpenStack, a simple certificate authority is provided by Compute for
|
||||
cloudpipe VPNs and VM image decryption.
|
||||
|
||||
Challenge-Handshake Authentication Protocol (CHAP)
|
||||
|
||||
@@ -717,6 +699,12 @@ C
|
||||
A person who plans, designs, and oversees the creation of
|
||||
clouds.
|
||||
|
||||
Cloud Auditing Data Federation (CADF)
|
||||
|
||||
Cloud Auditing Data Federation (CADF) is a
|
||||
specification for audit event data. CADF is
|
||||
supported by OpenStack Identity.
|
||||
|
||||
cloud computing
|
||||
|
||||
A model that enables access to a shared pool of configurable
|
||||
@@ -782,10 +770,6 @@ C
|
||||
services. The project name of Clustering service is
|
||||
senlin.
|
||||
|
||||
CMDB
|
||||
|
||||
Configuration Management Database.
|
||||
|
||||
congress
|
||||
|
||||
OpenStack project that provides the Governance service.
|
||||
|
||||
@@ -155,7 +155,7 @@ satisfy the following requirements:
|
||||
Audit records can be transferred to a remote audit daemon.
|
||||
* - Discretionary Access Control
|
||||
- :term:`DAC` restricts access to
|
||||
file system objects based on :term:`ACL`
|
||||
file system objects based on :term:`ACL <access control list (ACL)>`
|
||||
that include the standard UNIX permissions for user,
|
||||
group and others. Access control mechanisms also protect IPC objects
|
||||
from unauthorized access.
|
||||
|
||||
@@ -50,8 +50,8 @@ created and secured.
|
||||
|
||||
With documentation created, security domains called out, and it all
|
||||
stored where the service teams also have authenticated access, Bob looks
|
||||
at system management. He outlines a :term:`configuration management
|
||||
database (CMDB)<CMDB>` that will work with the PXE imaging system so
|
||||
at system management. He outlines a configuration management
|
||||
database (CMDB) that will work with the PXE imaging system so
|
||||
that whenever a device calls in for an image, the MAC address will be
|
||||
used as the unique identifier in the CMDB entry. A script will report
|
||||
back on the hardware and software configuration of the system so that
|
||||
|
||||
@@ -32,9 +32,8 @@ Hardware inventory
|
||||
------------------
|
||||
|
||||
Clouds without stringent compliance requirements for written documentation
|
||||
might benefit from having a Configuration Management Database
|
||||
(:term:`configuration management database (CMDB)<CMDB>`). CMDBs are
|
||||
normally used for hardware asset tracking and overall life-cycle
|
||||
might benefit from having a Configuration Management Database (CMDB). CMDBs
|
||||
are normally used for hardware asset tracking and overall life-cycle
|
||||
management. By leveraging a CMDB, an organization can quickly identify
|
||||
cloud infrastructure hardware such as compute nodes, storage nodes, or
|
||||
network devices. A CMDB can assist in identifying assets that exist on
|
||||
|
||||
@@ -42,8 +42,8 @@ is a multi-tenancy enterprise service, the choice to use for L2 isolation in
|
||||
this environment is to use overlay networking. Another aspect of Bob's cloud is
|
||||
the self-service aspect where the customer can provision available networking
|
||||
services as needed. These networking services encompass L2 networks, L3
|
||||
Routing, Network :term:`ACL` and NAT. It is important that per-tenant quota's
|
||||
be implemented in this environment.
|
||||
Routing, Network :term:`ACL <access control list (ACL)>` and NAT. It is
|
||||
important that per-tenant quota's be implemented in this environment.
|
||||
|
||||
An added benefit with utilizing OpenStack Networking is when new advanced
|
||||
networking services become available, these new features can be easily provided
|
||||
|
||||
@@ -36,7 +36,7 @@ the identities of the parties. The core components of PKI are:
|
||||
End entity
|
||||
User, process, or system that is the subject of a certificate.
|
||||
|
||||
Certification Authority (:term:`CA`)
|
||||
Certification Authority (:term:`CA <certificate authority (CA)>`)
|
||||
Defines certificate policies, management, and issuance of certificates.
|
||||
|
||||
Registration Authority (RA)
|
||||
|
||||
Reference in New Issue
Block a user