From 0c863608cbb7546b9ccb51cb4f4ec030e3d7b083 Mon Sep 17 00:00:00 2001 From: Andreas Jaeger Date: Mon, 17 Mar 2014 22:08:58 +0100 Subject: [PATCH] Merge glossary from openstack-manuals contains these changes: O'Reilly Edits for the glossary Use X-as-a-Service XaaS in Glossary Update Sahara (ex. Savanna) glossary term Adds LBaaS overview to Networking intro Lowercase compute node Change command line to command-line Typos in doc/glossary/glossary-terms.xml Update glossary Change-Id: I822b4218a4f373a9605759ec743687e650c45a69 --- doc/openstack-ops/glossary-terms.xml | 851 +++++++++++++-------------- 1 file changed, 419 insertions(+), 432 deletions(-) diff --git a/doc/openstack-ops/glossary-terms.xml b/doc/openstack-ops/glossary-terms.xml index 9e42058d..14a1882f 100644 --- a/doc/openstack-ops/glossary-terms.xml +++ b/doc/openstack-ops/glossary-terms.xml @@ -1,4 +1,9 @@ + + +]> + access control list - A list of permissions attached to an object. An ACL specifies which users or system processes have access to objects. It also -defines which operations can be performed on specified objects. -Each entry in a typical ACL specifies a subject and an operation. For instance, ACL entry, (Alice, delete), for a file gives Alice permission to delete the file. + + A list of permissions attached to an object. An ACL + specifies which users or system processes have + access to objects. It also defines which operations + can be performed on specified objects. Each entry + in a typical ACL specifies a subject and an + operation. For instance, the ACL entry (Alice, + delete) for a file gives Alice permission to + delete the file. + access key Alternative term for an Amazon EC2 access key. - See EC2 Access key. + See EC2 access key. account - The swift context of an account. Do not confuse + The Object Storage context of an account. Do not confuse with a user account from an authentication service such as Active Directory, /etc/passwd, OpenLDAP, OpenStack Identity Service, and so on. @@ -53,8 +65,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, account auditor - Checks for missing replicas, incorrect, and - corrupted objects in a specified swift account by + Checks for missing replicas and incorrect or + corrupted objects in a specified Object Storage account by running queries against the back-end SQLite database. @@ -62,30 +74,31 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, account database - A SQLite database that contains swift accounts - and related metadata and is accessed by the - accounts server. + A SQLite database that contains Object Storage accounts + and related metadata and that the + accounts server accesses. account reaper - A swift worker that scans for and deletes - account databases that are marked for deletion on - an account server. + An Object Storage worker that scans for and deletes + account databases and that the account server has marked + for deletion. + account server - Lists containers in swift and stores container + Lists containers in Object Storage and stores container information in the account database. account service - A swift component that provides account services + An Object Storage component that provides account services such as list, create, modify, and audit. Do not confuse with OpenStack Identity Service, OpenLDAP, or similar user account services. @@ -94,7 +107,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, accounting - The Compute Service provides accounting information + The Compute Service provides accounting information through the event notification and system usage data facilities. @@ -118,7 +131,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Active Directory - Authentication and Identity Service by + Authentication and identity service by Microsoft, based on LDAP. Supported in OpenStack. @@ -126,7 +139,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, active/passive configuration - In a high availability setup with an + In a high-availability setup with an active/passive configuration, systems are set up to bring additional resources online to replace those that have failed. @@ -147,7 +160,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, A subset of API calls that are accessible to authorized administrators and are generally not - accessible to end users or the public internet, + accessible to end users or the public Internet. They can exist as a separate service (keystone) or can be a subset of another API (nova). @@ -180,7 +193,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, alert - The Compute Service can send alerts through its + The Compute Service can send alerts through its notification system, which includes a facility to create custom notification drivers. Alerts can be sent to and displayed on the horizon dashboard. @@ -189,7 +202,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, allocate - The process of taking floating IP address from + The process of taking a floating IP address from the address pool so it can be associated with a fixed IP on a guest VM instance. @@ -215,20 +228,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Supported by Image Service. - - AMQP - - Advanced Message Queue Protocol. An open - Internet protocol for reliably sending and - receiving messages. It enables building a diverse, - coherent messaging ecosystem. - - Anvil A project that ports the shell script-based - project named devstack to Python. + project named DevStack to Python. @@ -266,7 +270,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, The daemon, worker, or service that a client communicates with to access an API. API endpoints - can provide any number of services such as + can provide any number of services, such as authentication, sales data, performance metrics, Compute VM commands, census data, and so on. @@ -283,8 +287,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, API extension plug-in - Alternative term for a neutron plug-in or - neutron API extension. + Alternative term for a Networking plug-in or + Networking API extension. @@ -385,7 +389,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, attach The process of connecting a VIF or vNIC to a L2 - network in neutron. In the context of Compute, this + network in Networking. In the context of Compute, this process connects a storage volume to an instance. @@ -408,8 +412,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, auditor A worker process that verifies the integrity - of swift objects, containers, and accounts. - Auditors is the collective term for the swift + of Object Storage objects, containers, and accounts. + Auditors is the collective term for the Object Storage account auditor, container auditor, and object auditor. @@ -424,7 +428,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, auth node - Alternative term for a swift authorization + Alternative term for an Object Storage authorization node. @@ -457,16 +461,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, authorization The act of verifying that a user, process, or - client is authorized to perform an action, such as - delete a swift object, list a swift container, - start a guest VM, reset a password, and so - on. + client is authorized to perform an action. authorization node - A swift node that provides authorization + An Object Storage node that provides authorization services. @@ -488,7 +489,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, auto declare - A Compute RabbitMQ setting that determines if a + A Compute RabbitMQ setting that determines whether a message exchange is automatically created when the program starts. @@ -512,11 +513,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, B - back-end + back end Interactions and processes that are obfuscated from the user, such as Compute volume mount, data - transmission to an isCSI target by a daemon, or + transmission to an iSCSI target by a daemon, or Object Storage object integrity checks. @@ -535,11 +536,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, back-end store The persistent data store used to save and - retrieve a information for a service, such as lists of + retrieve information for a service, such as lists of Object Storage objects, current state of guest VMs, lists of user names, and so on. Also, the method that the Image Service uses to get and store VM images. - Options include swift, local file system, S3, and + Options include Object Storage, local file system, S3, and HTTP. @@ -556,7 +557,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, bare - A Image Service container format that indicates that no + An Image Service container format that indicates that no container exists for the VM image. @@ -591,7 +592,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - bit-per-second (BPS) + bits-per-second (BPS) The universal measurement of how quickly data is transferred from place to place. @@ -663,10 +664,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, builder file - Contains configuration information for a swift - ring, and is used to re-configure the ring or to - recreate it from scratch after a serious - failure. + Contains configuration information that Object + Storage uses to reconfigure a ring or to re-create it from + scratch after a serious failure. + @@ -686,12 +687,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, there are usually 8 bits to a byte. - - - - - - @@ -727,7 +722,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, An OpenStack grouped release of projects that came out in the spring of 2011. It included Compute (nova), Object Storage (swift), and the - Image service (glance). + Image Service (glance). @@ -749,8 +744,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, capacity cache - A Compute back end database table that contains - the current workload, amount of free RAM, + A Compute back-end database table that contains + the current workload, amount of free RAM, and number of VMs running on each host. Used to determine on which VM a host starts. @@ -783,7 +778,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, catalog service - An Identity Service service that lists API endpoints + An Identity Service that lists API endpoints that are available to a user after authentication with the Identity Service. @@ -906,7 +901,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Cisco neutron plug-in - A neutron plug-in for Cisco devices and + A Networking plug-in for Cisco devices and technologies including UCS and Nexus. @@ -940,7 +935,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, cloud controller node - A node that runs network, volume, API, scheduler + A node that runs network, volume, API, scheduler, and image services. Each service may be broken out into separate nodes for scalability or availability. @@ -970,7 +965,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, A package commonly installed in VM images that performs initialization of an instance after boot using information that it retrieves from the - metadata service such as the SSH public key and + metadata service, such as the SSH public key and user data. @@ -1022,9 +1017,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, compression - OpenStack supports compression at the Linux file + Reduce the size of files by special encoding, the file + can be decompressed again to its original content. + OpenStack supports compression at the Linux file system level but does not support compression for - things such as swift objects or Image Service VM + things such as Object Storage objects or Image Service VM images. @@ -1062,9 +1059,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, compute node - A node that runs the nova-compute daemon, a VM - instance that provides a wide range of services - such as a web services and analytics. + + A node that runs the nova-compute daemon + which manages VM instances that provide a wide range + of services such as a web applications and + analytics. + @@ -1088,9 +1089,9 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, concatenated object - A segmented large object within swift that is - put back together again and then sent to the - client. + A set of segment objects that Object Storage combines + and sends to the client. + @@ -1098,14 +1099,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, In Compute, conductor is the process that proxies database requests from the compute process. Using - conductor improves security as compute nodes do not + conductor improves security because compute nodes do not need direct access to the database. consistency window - The amount of time it takes for a new swift + The amount of time it takes for a new Object Storage object to become accessible to all clients. @@ -1119,9 +1120,9 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, container - Used to organize and store objects within swift, - similar to the concept as a Linux directory but - cannot be nested. Alternative term for a Image Service + Organizes and stores objects in Object Storage. + Similar to the concept of a Linux directory but + cannot be nested. Alternative term for an Image Service container format. @@ -1129,16 +1130,18 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, container auditor Checks for missing replicas or incorrect objects - in the specified swift containers through queries + in specified Object Storage containers through queries to the SQLite back-end database. container database - A SQLite database that contains swift containers - and related metadata and is accessed by the - container server + + A SQLite database that stores Object Storage + containers and container metadata. The container + server accesses this database. + @@ -1154,13 +1157,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, container server - A swift that manages containers. + An Object Storage server that manages containers. container service - The swift component that provides container + The Object Storage component that provides container services, such as create, delete, list, and so on. @@ -1184,12 +1187,17 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, core project - An official OpenStack project. Currently consists of Compute (nova), Object - Storage (swift), Image Service (glance), Identity (keystone), Dashboard - (horizon), Networking (neutron), and Block Storage (cinder). The Telemetry - module (ceilometer) and Orchestration module (heat) are integrated projects as - of the Havana release. In the Icehouse release, the Database module (trove) - gains integrated project status. + + An official OpenStack project. Currently consists of + Compute (nova), Object Storage (swift), Image + Service (glance), Identity (keystone), Dashboard + (horizon), Networking (neutron), and Block Storage + (cinder). The Telemetry module (ceilometer) and + Orchestration module (heat) are integrated projects + as of the Havana release. In the Icehouse release, + the Database module (trove) gains integrated project + status. + @@ -1204,12 +1212,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, credentials - Data that is only known to or accessible by a - user that is used to verify the user is who they - say they are and presented to the server during - authentication. Examples include a password, - secret key, digital certificate, fingerprint, and - so on. + + Data that is only known to or accessible by a user + and used to verify that the user is who they say + they are. Credentials are presented to the server + during authentication. Examples include a password, + secret key, digital certificate, fingerprint, and so + on. @@ -1243,12 +1252,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, dashboard. - - - - - - @@ -1301,7 +1304,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, database replicator - A swift component that copies changes in the + An Object Storage component that copies changes in the account, container, and object databases to other nodes. @@ -1310,9 +1313,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, deallocate The process of removing the association between - a floating IP address and a fixed IP address thus - returning the floating IP to the address - pool. + a floating IP address and a fixed IP address. + Once this association is removed, the floating IP + returns to the address pool. + @@ -1327,7 +1331,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, The process of finding duplicate data at the disk block, file, and/or object level to minimize - storage use, currently unsupported within + storage use—currently unsupported within OpenStack. @@ -1357,16 +1361,18 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, delayed delete - An option within Image Service so that rather than - immediately delete an image, it is deleted after a - pre-defined number of seconds. + + An option within Image Service so that an image is + deleted after a predefined number of seconds instead + of immediately. + delivery mode Setting for the Compute RabbitMQ message delivery - mode, can be set to either transient or + mode; can be set to either transient or persistent. @@ -1387,26 +1393,21 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, user. - - device - - In the context of swift this refers to the - underlying storage device. - - device ID - Maps swift partitions to physical storage + Maps Object Storage partitions to physical storage devices. device weight - Used to distribute the partitions among swift - devices. The distribution is usually proportional - to the storage capacity of the device. + + Distributes partitions proportionately across + Object Storage devices based on the storage + capacity of each device. + @@ -1420,15 +1421,16 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, DHCP - Dynamic Host Configuration Protocol. A network - protocol that configures devices that are - connected to a network so they can communicate on - that network by using the Internet Protocol (IP). - The protocol is implemented in a client-server - model where DHCP clients request configuration - data such as, an IP address, a default route, and - one or more DNS server addresses from a DHCP - server. + + Dynamic Host Configuration Protocol. A network + protocol that configures devices that are connected + to a network so that they can communicate on that + network by using the Internet Protocol (IP). The + protocol is implemented in a client-server model + where DHCP clients request configuration data such + as, an IP address, a default route, and one or more + DNS server addresses from a DHCP server. + @@ -1438,7 +1440,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, OpenStack that came out in the fall of 2011, the fourth release of OpenStack. It included Compute (nova 2011.3), Object Storage (swift 1.4.3), and - the Image service (glance). + the Image Service (glance). @@ -1478,7 +1480,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, disk encryption The ability to encrypt data at the file system, - disk partition or whole disk level. Supported + disk partition, or whole-disk level. Supported within Compute VMs. @@ -1493,7 +1495,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, dispersion - In swift, tools to test and ensure dispersion of + In Object Storage, tools to test and ensure dispersion of objects and containers to ensure fault tolerance. @@ -1548,7 +1550,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, In Compute, the support that enables associating DNS entries with floating IP addresses, nodes, or - cells so host names are consistent across + cells so that hostnames are consistent across reboots. @@ -1612,9 +1614,9 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Dynamic HyperText Markup Language (DHTML) - Pages that use HTML, - JavaScript, and CCS to enable users to interact - with a web page or show simple animation. + Pages that use HTML, JavaScript, and Cascading + Style Sheets to enable users to interact with a web + page or show simple animation. @@ -1669,7 +1671,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, EC2 secret key Used along with an EC2 access key when - communicating with the Compute EC2 API, is used to + communicating with the Compute EC2 API; used to digitally sign each request. @@ -1704,8 +1706,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, endpoint template A list of URL and port number endpoints that - indicate where a service, such as object storage, - compute, identity, and so on, can be + indicate where a service, such as Object Storage, + Compute, Identity, and so on, can be accessed. @@ -1714,8 +1716,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Any piece of hardware or software that wants to connect to the network services provided by - neutron, the Network Connectivity service. An - entity can make use of neutron by implementing a + Networking, the network connectivity service. An + entity can make use of Networking by implementing a VIF. @@ -1771,14 +1773,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, ETag - MD5 hash of an object within swift, used to + MD5 hash of an object within Object Storage, used to ensure data integrity. euca2ools - A collection of command line tools for + A collection of command-line tools for administering VMs, most are compatible with OpenStack. @@ -1827,9 +1829,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, exclusive queue - Connected to by a direct consumer in RabbitMQ / - Compute, the message can only be consumed by the - current connection. + + Connected to by a direct consumer in + RabbitMQ—Compute, the message can be consumed + only by the current connection. + @@ -1838,17 +1842,19 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, File system option that enables storage of additional information beyond owner, group, permissions, modification time, and so on. The - underlying swift file system must support extended + underlying Object Storage file system must support extended attributes. extension - Alternative term for a Compute API extension or - plug-in. In the context of Identity Service this is a call - that is specific to the implementation, such as - adding support for OpenID. + + Alternative term for an API extension or + plug-in. In the context of Identity Service, this is + a call that is specific to the implementation, such + as adding support for OpenID. + @@ -1923,16 +1929,25 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Used to restrict communications between hosts and/or nodes, implemented in Compute using iptables, - arptables, ip6tables and etables. + arptables, ip6tables, and etables. + + + + Firewall-as-a-Service (FWaaS) + + + A Networking extension that provides perimeter + firewall functionality. + fixed IP address An IP address that is associated with the same - instance each time that instance boots, generally + instance each time that instance boots, is generally not accessible to end users or the public - internet, used for management of the + Internet, and used for management of the instance. @@ -1990,7 +2005,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, floating IP address An IP address that a project can associate - with a VM so the instance has the same public IP + with a VM so that the instance has the same public IP address each time that it boots. You create a pool of floating IP addresses and assign them to instances as they are launched to maintain a @@ -2005,31 +2020,25 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, OpenStack that came out in the fall of 2012, the sixth release of OpenStack. It includes Compute (nova), Object Storage (swift), Identity - (keystone), Networking (neutron), Image service - (glance) and Volumes or Block Storage + (keystone), Networking (neutron), Image Service + (glance), and Volumes or Block Storage (cinder). FormPost - swift middleware that uploads + Object Storage middleware that uploads (posts) an image through a form on a web page. - front-end + frontend - The point where a user interacts with a service, + The point where a user interacts with a service; can be an API endpoint, the horizon dashboard, or - a command line tool. - - - - - - + a command-line tool. @@ -2105,8 +2114,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Green Threads - The cooperative threading model used by Python, - reduces race conditions, and only context switches + The cooperative threading model used by Python; + reduces race conditions and only context switches when specific library calls are made. Each OpenStack service is its own thread. @@ -2140,7 +2149,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, handover - An object state in swift where a new replica of + An object state in Object Storage where a new replica of the object is automatically created due to a drive failure. @@ -2248,7 +2257,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - HyperText Transfer Protocol (HTTP) + Hypertext Transfer Protocol (HTTP) The protocol that tells browsers where to go to find information. @@ -2258,7 +2267,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Hypertext Transfer Protocol Secure (HTTPS) - Encrypted HTTP communications using SSL or TLS, + Encrypted HTTP communications using SSL or TLS; most OpenStack API endpoints and many inter-component communications support HTTPS communication. @@ -2278,12 +2287,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, through host aggregates. - - - - - - @@ -2291,15 +2294,16 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, IaaS - Infrastructure as a Service. IaaS is a provision - model in which an organization outsources the - equipment used to support operations, including - storage, hardware, servers and networking - components. The service provider owns the - equipment and is responsible for housing, running - and maintaining it. The client typically pays on a - per-use basis. IaaS is a model for providing cloud - services. + + Infrastructure-as-a-Service. IaaS is a provisioning + model in which an organization outsources physical + components of a data center such as storage, + hardware, servers and networking components. A + service provider owns the equipment and is + responsible for housing, operating and maintaining + it. The client typically pays on a per-use + basis. IaaS is a model for providing cloud services. + @@ -2324,10 +2328,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - Identity back-end + Identity back end The source used by Identity Service to retrieve user - information an OpenLDAP server for example. + information; an OpenLDAP server for example. @@ -2386,7 +2390,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, image ID - Combination of URI and UUID used to access + Combination of a URI and UUID used to access Image Service VM images through the image API. @@ -2439,7 +2443,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, image store The back-end store used by Image Service to store VM - images, options include swift, local file system, + images, options include Object Storage, local file system, S3, or HTTP. @@ -2477,7 +2481,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, instance A running VM, or a VM in a known state such as - suspended that can be used like a hardware server. + suspended, that can be used like a hardware server. @@ -2518,7 +2522,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, interface ID - Unique ID for a neutron VIF or vNIC in the form + Unique ID for a Networking VIF or vNIC in the form of a UUID. @@ -2592,7 +2596,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, as different Netfilter modules) and the chains and rules it stores. Different kernel modules and programs are currently used for different - protocols; iptables applies to IPv4, ip6tables to + protocols: iptables applies to IPv4, ip6tables to IPv6, arptables to ARP, and ebtables to Ethernet frames. Requires root privilege to manipulate. @@ -2621,12 +2625,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, project. - - - - - - @@ -2666,12 +2664,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Project name for the tenth release of OpenStack. - - - - - - @@ -2704,7 +2696,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, large object - An object within swift that is larger than 5 + An object within Object Storage that is larger than 5 GBs. @@ -2740,7 +2732,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Linux Bridge neutron plug-in Enables a Linux bridge to understand - a neutron port, interface attachment, and other + a Networking port, interface attachment, and other abstractions. @@ -2762,7 +2754,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, load balancer - A load balancer is a logical device which + A load balancer is a logical device that belongs to a cloud account. It is used to distribute workloads between multiple back-end systems or services, based on the criteria defined @@ -2778,9 +2770,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - + Load-Balancing-as-a-Service (LBaaS) - + Enables Networking to distribute incoming + requests evenly between designated instances. @@ -2797,7 +2790,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, management network A network segment used for administration, not - accessible to the public internet. + accessible to the public Internet. @@ -2811,13 +2804,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, manifest Used to track segments of a large object within - swift. + Object Storage. manifest object - A special swift object that contains the + A special Object Storage object that contains the manifest for a large object. @@ -2832,7 +2825,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, melange Project name for OpenStack Network Information - Service. To be merged with neutron. + Service. To be merged with Networking. @@ -2854,7 +2847,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, memcached A distributed memory object caching system that - is used by swift for caching. + is used by Object Storage for caching. @@ -2916,8 +2909,16 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Modular Layer 2 (ML2) neutron plug-in Can concurrently use multiple - layer 2 networking technologies, such as 802.1Q and - VXLAN, in neutron. + layer-2 networking technologies, such as 802.1Q and + VXLAN, in Networking. + + + + Monitor (LBaaS) + + LBaaS feature that provides availability monitoring + using the ping command, TCP, and + HTTP/HTTPS GET. @@ -2944,12 +2945,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, connected to it. - - - - - - @@ -2984,7 +2979,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, A virtual network that provides connectivity between entities. For example, a collection of virtual ports that share network connectivity. In - neutron terminology, a network is always a Layer-2 + Networking terminology, a network is always a Layer-2 network. @@ -2999,10 +2994,12 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, network controller - A Compute daemon that orchestrates the network - configuration of nodes including includes IP - addresses, VLANs, bridging, and manages routing - for both public and private networks. + + A Compute daemon that orchestrates the network + configuration of nodes, including IP addresses, + VLANs, and bridging. Also manages routing for both + public and private networks. + @@ -3016,7 +3013,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, network ID Unique ID assigned to each network segment - within neutron. Same as network UUID + within Networking. Same as network UUID @@ -3030,15 +3027,15 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, network node - Any Compute node that runs the network worker + Any compute node that runs the network worker daemon. network segment - Represents a virtual, isolated OSI layer 2 - subnet in neutron. + Represents a virtual, isolated OSI layer-2 + subnet in Networking. @@ -3052,7 +3049,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, network UUID - Unique ID for a neutron network segment. + Unique ID for a Networking network segment. @@ -3072,6 +3069,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, neutron. + + Networking API + + API used to access OpenStack Networking. Provides an + extensible architecture to enable custom plug-in + creation. + + neutron @@ -3083,9 +3088,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, neutron API - API used to access neutron. Provides an - extensible architecture to enable custom plug-in - creation. + An alternative name for Networking API. @@ -3099,7 +3102,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, neutron plug-in - Interface within neutron that enables + Interface within Networking that enables organizations to create custom plug-ins for advanced features such as QoS, ACLs, or IDS. @@ -3112,13 +3115,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Compute. - - Nicira NVP neutron plug-in - - Provides support for the Nicira Network - Virtualization Platform (NVP) in neutron. - - No ACK @@ -3170,7 +3166,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, - nova network + nova-network A Compute component that manages IP address allocation, firewalls, and other network-related @@ -3186,17 +3182,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, object - A BLOB of data held by swift, can be in any + A BLOB of data held by Object Storage; can be in any format. - - Object API - - Alternative term for the swift object - API. - - object auditor @@ -3208,7 +3197,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, object expiration - A configurable option within swift to + A configurable option within Object Storage to automatically delete objects after a specified amount of time has passed or a certain date is reached. @@ -3217,13 +3206,13 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, object hash - Uniquely ID for a swift object. + Uniquely ID for an Object Storage object. object path hash - Used by swift to determine the location of an + Used by Object Storage to determine the location of an object in the ring. Maps objects to partitions. @@ -3231,31 +3220,32 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, object replicator - A swift component that copies and object to + An Object Storage component that copies and object to remote partitions for fault tolerance. object server - A swift component that is responsible for + An Object Storage component that is responsible for managing objects. - - Object Service API - - Alternative term for the swift object - API. - - Object Storage - The OpenStack core project that provides - eventually consistent and redundant storage and - retrieval of fixed digital content. The project name - of Object Storage is swift. + The OpenStack core project that + provides eventually consistent and redundant + storage and retrieval of fixed digital + content. The project name of OpenStack + Object Storage is swift. + + + + + Object Storage API + + API used to access OpenStack Object Storage. @@ -3267,15 +3257,16 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, object versioning - Allows a user to set a flag on a swift container - so all objects within the container are - versioned. + + Allows a user to set a flag on an Object Storage + container so that all objects within the container + are versioned. Oldie - Term for a swift process that runs + Term for an Object Storage process that runs for a long time. Can indicate a hung process. @@ -3300,7 +3291,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Open vSwitch neutron plug-in Provides support for - Open vSwitch in neutron. + Open vSwitch in Networking. @@ -3316,10 +3307,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, OpenStack is a cloud operating system that controls large pools of compute, storage, and networking - resources throughout a datacenter, all managed through + resources throughout a data center, all managed through a dashboard that gives administrators control while empowering their users to provision resources through - a web interface. OpenStack is an Open Source project licensed + a web interface. OpenStack is an open source project licensed under the Apache License 2.0. @@ -3350,9 +3341,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, orphan - In the context of swift this is a process that - is not terminated after an upgrade, restart, or - reload of the service. + + In the context of Object Storage, this is a process + that is not terminated after an upgrade, restart, or + reload of the service. + @@ -3371,22 +3364,24 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, partition - A unit of storage within swift used to store - objects, exists on top of devices, replicated for - fault tolerance. + + A unit of storage within Object Storage used to + store objects. It exists on top of devices and is, + replicated for fault tolerance. + partition index - Contains the locations of all swift partitions + Contains the locations of all Object Storage partitions within the ring. partition shift value - Used by swift to determine which partition data + Used by Object Storage to determine which partition data should reside on. @@ -3394,7 +3389,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, pause A VM state where no changes occur (no changes in - memory, network communications stop, etc), the VM + memory, network communications stop, etc); the VM is frozen but not shut down. @@ -3410,7 +3405,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, persistent message A message that is stored both in memory and on - disk, the message is not lost after a failure or + disk. The message is not lost after a failure or restart. @@ -3424,38 +3419,55 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, personality file - A file used to customize a Compute instance, can be - used to inject SSH keys or a specific network - configuration. + + A file used to customize a Compute instance. It can + be used to inject SSH keys or a specific network + configuration. + + + Platform-as-a-Service (PaaS) + + + Provides to the consumer the ability to deploy + applications through a programming language or tools + supported by the cloud platform provider. An example + of Platform-as-a-Service is an Eclipse/Java + programming platform provided with no downloads + required. + + + plug-in Software component providing the actual - implementation for neutron APIs, or for Compute + implementation for Networking APIs, or for Compute APIs, depending on the context. policy service - Component of Identity Service that provides a rule - management interface and a rule based - authorization engine. + + Component of Identity Service that provides a + rule-management interface and a rule-based + authorization engine. + port - A virtual network port within neutron, VIFs / + A virtual network port within Networking; VIFs / vNICs are connected to a port. port UUID - Unique ID for a neutron port. + Unique ID for a Networking port. @@ -3478,7 +3490,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, An IP address used for management and administration, not available to the public - internet. + Internet. @@ -3506,7 +3518,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, project ID - User defined alpha-numeric string in Compute, the + User-defined alpha-numeric string in Compute; the name of a project. @@ -3526,15 +3538,15 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, proxy node - A node that provides the swift proxy + A node that provides the Object Storage proxy service. proxy server - Users of swift interact with the service through - the proxy server which in-turn looks up the + Users of Object Storage interact with the service through + the proxy server, which in-turn looks up the location of the requested data within the ring and returns the results to the user. @@ -3542,8 +3554,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, public API - An API endpoint used for both service to service - communication and end user interactions. + An API endpoint used for both service-to-service + communication and end-user interactions. @@ -3574,7 +3586,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Puppet - An operating system configuration management + An operating system configuration-management tool supported by OpenStack. @@ -3599,15 +3611,15 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Qpid - Message queue software supported by OpenStack, + Message queue software supported by OpenStack; an alternative to RabbitMQ. quarantine - If swift finds objects, containers, or accounts - that are corrupt they are placed in this state, + If Object Storage finds objects, containers, or accounts + that are corrupt, they are placed in this state, are not replicated, cannot be read by clients, and a correct copy is re-replicated. @@ -3644,7 +3656,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Rackspace Cloud Files Released as open source by Rackspace in 2010, - the basis for swift. + the basis for Object Storage. @@ -3683,7 +3695,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, rate limit - Configurable option within swift to limit + Configurable option within Object Storage to limit database writes on a per-account and/or per-container basis. @@ -3692,14 +3704,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, raw One of the VM image disk formats supported by - Image Service, an unstructured disk image. + Image Service; an unstructured disk image. rebalance - The process of distributing swift partitions - across all drives in the ring, used during initial + The process of distributing Object Storage partitions + across all drives in the ring; used during initial ring creation and after ring reconfiguration. @@ -3714,7 +3726,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, power cycling the server. The virtualization platform should ensure that the reboot action has completed successfully even in cases in which the - underlying domain/vm is paused or halted/stopped. + underlying domain/VM is paused or halted/stopped. @@ -3729,7 +3741,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Recon - A swift component that collects metrics. + An Object Storage component that collects metrics. @@ -3750,17 +3762,10 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, record ID A number within a database that is incremented - each time a change is made. Used by swift when + each time a change is made. Used by Object Storage when replicating. - - Red Dwarf Lite - - Community project that aims to provide database - as a service. - - Red Hat Enterprise Linux (RHEL) @@ -3778,7 +3783,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, region - A Discrete OpenStack environment with dedicated API + A discrete OpenStack environment with dedicated API endpoints that typically shares only the Identity Service (keystone) with other regions. @@ -3802,7 +3807,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, (RADOS) A collection of components that provides object - storage within Ceph. Similar to swift. + storage within Ceph. Similar to OpenStack Object + Storage. @@ -3816,15 +3822,15 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, replica Provides data redundancy and fault tolerance by - creating copies of swift objects, accounts, and - containers so they are not lost when the + creating copies of Object Storage objects, accounts, and + containers so that they are not lost when the underlying storage fails. replica count - The number of replicas of the data in a swift + The number of replicas of the data in an Object Storage ring. @@ -3839,7 +3845,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, replicator - The swift back-end process that creates and + The Object Storage back-end process that creates and manages object replicas. @@ -3882,7 +3888,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, ring - An entity that maps swift data to partitions. A + An entity that maps Object Storage data to partitions. A separate ring exists for each service, such as account, object, and container. @@ -3890,7 +3896,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, ring builder - Builds and manages rings within swift, assigns + Builds and manages rings within Object Storage, assigns partitions to devices, and pushes the configuration to other storage nodes. @@ -3899,7 +3905,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Role Based Access Control (RBAC) Provides a predefined list of actions that the - user can perform such as start or stop VMs, reset + user can perform, such as start or stop VMs, reset passwords, and so on. Supported in both Identity Service and Compute and can be configured using the horizon dashboard. @@ -3941,8 +3947,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, routing key The Compute direct exchanges, fanout exchanges, and - topic exchanges use this to determine how to - process a message, processing varies depending on + topic exchanges use this key to determine how to + process a message; processing varies depending on exchange type. @@ -3979,7 +3985,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Ryu neutron plug-in Enables the Ryu network operating system to - function as a neutron OpenFlow controller. + function as a Networking OpenFlow controller. @@ -3989,17 +3995,21 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, S3 - Object storage service by Amazon, similar in - function to swift, can act as a back-end store for - Image Service VM images. + + Object storage service by Amazon; similar in + function to Object Storage, it can act as a back-end + store for Image Service VM images. + sahara - OpenStack project that provides a scalable data - processing stack and associated management interfaces. - + + OpenStack project that provides a scalable + data-processing stack and associated management + interfaces. + @@ -4020,14 +4030,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, scrubber - Checks for and deletes unused VM, the component + Checks for and deletes unused VMs; the component of Image Service that implements delayed delete. secret key - String of text only known by the user, used + String of text known only by the user; used along with an access key to make requests to the Compute API. @@ -4050,8 +4060,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, segmented object - A swift large object that has been broken up - into pieces, the re-assembled object is called a + An Object Storage large object that has been broken up + into pieces. The re-assembled object is called a concatenated object. @@ -4061,7 +4071,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Computer that provides explicit services to the client software running on that system, often managing a variety of computer operations. - A server is a VM instance in the compute system. + A server is a VM instance in the Compute system. Flavor and image are requisite elements when creating a server. @@ -4138,7 +4148,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, session persistence - A feature of the load balancing service. It + A feature of the load-balancing service. It attempts to force subsequent connections to a service to be redirected to the same node as long as it is online. @@ -4178,15 +4188,15 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, can share one or more public IPs with any other server in the group. With the exception of the first server in a shared IP group, servers must be - launched into shared IP groups. A server may only - be a member of one shared IP group. + launched into shared IP groups. A server may + be a member of only one shared IP group. shared storage Block storage that is simultaneously accessible - by multiple clients. For example, NFS. + by multiple clients, for example, NFS. @@ -4221,7 +4231,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, SmokeStack Runs automated tests against the core OpenStack - API, written in Rails. + API; written in Rails. @@ -4264,7 +4274,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, spread-first scheduler The Compute VM scheduling algorithm that attempts - to start new VM on the host with the least amount + to start a new VM on the host with the least amount of load. @@ -4299,22 +4309,22 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, StaticWeb - WSGI middleware component of swift that serves + WSGI middleware component of Object Storage that serves container data as a static web page. - storage back-end + storage back end The method that a service uses for persistent - storage such as iSCSI, NFS, or local disk. + storage, such as iSCSI, NFS, or local disk. storage node - A swift node that provides container services, - account services, and object services, controls + An Object Storage node that provides container services, + account services, and object services; controls the account databases, container databases, and object storage. @@ -4324,20 +4334,20 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, A XenAPI component that provides a pluggable interface to support a wide variety of persistent - storage back-ends. + storage back ends. - storage manager back-end + storage manager back end - A persistent storage method supported by XenAPI + A persistent storage method supported by XenAPI, such as iSCSI or NFS. storage services - Collective name for the swift object services, + Collective name for the Object Storage object services, container services, and account services. @@ -4385,8 +4395,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, swawth An authentication and authorization service for - swift, implemented through WSGI middleware, uses - swift itself as the persistent backing + Object Storage, implemented through WSGI middleware; uses + Object Storage itself as the persistent backing store. @@ -4400,28 +4410,28 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, swift All in One (SAIO) - Creates a full swift development environment + Creates a full Object Storage development environment within a single VM. swift middleware - Collective term for swift components that + Collective term for Object Storage components that provide additional functionality. swift proxy server - Acts as the gatekeeper to swift and is + Acts as the gatekeeper to Object Storage and is responsible for authenticating the user. swift storage node - A node that runs swift account, container, and + A node that runs Object Storage account, container, and object services. @@ -4430,7 +4440,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Point in time since the last container and accounts database sync among nodes within - swift. + Object Storage. @@ -4467,8 +4477,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, TempAuth - An authentication facility within swift that - enables swift itself to perform authentication and + An authentication facility within Object Storage that + enables Object Storage itself to perform authentication and authorization. Frequently used in testing and development. @@ -4484,7 +4494,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, TempURL - A swift middleware component that enables creation of URLs for temporary object access. + An Object Storage middleware component that enables creation of URLs for temporary object access. @@ -4512,7 +4522,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, tenant ID Unique ID assigned to each tenant within - the Identity Service, the project IDs map to the + the Identity Service. The project IDs map to the tenant IDs. @@ -4534,8 +4544,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, tombstone - Used to mark swift objects that have been - deleted, ensures the object is not updated on + Used to mark Object Storage objects that have been + deleted; ensures that the object is not updated on another node after it has been deleted. @@ -4543,7 +4553,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, topic publisher A process that is created when a RPC call is - executed, used to push the message to the topic + executed; used to push the message to the topic exchange. @@ -4557,7 +4567,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, transaction ID - Unique ID assigned to each swift request, used + Unique ID assigned to each Object Storage request; used for debugging and tracing. @@ -4594,13 +4604,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, services to applications. - - - - - - - @@ -4614,14 +4617,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, unscoped token - Alternative term for a Identity Service default + Alternative term for an Identity Service default token. updater - Collective term for a group of swift components + Collective term for a group of Object Storage components that processes queued and failed updates for containers and objects. @@ -4629,8 +4632,8 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, user - In Identity Service each user is associated with one or - more tenants, and in Compute they can be associated + In Identity Service, each user is associated with one or + more tenants, and in Compute can be associated with roles, projects, or both. @@ -4651,12 +4654,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, An OpenStack-supported hypervisor. - - - - - - @@ -4664,7 +4661,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, VIF UUID - Unique ID assigned to each neutron VIF. + Unique ID assigned to each Networking VIF. @@ -4711,7 +4708,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, virtual network - An L2 network segment within neutron. + An L2 network segment within Networking. @@ -4725,7 +4722,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Virtual Network InterFace (VIF) An interface that is plugged into a port in a - neutron network. Typically a virtual network + Networking network. Typically a virtual network interface belonging to a VM. @@ -4753,9 +4750,11 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, virtual switch (vSwitch) - Software that runs on a host or node and - provides the features and functions of a hardware - based network switch. + + Software that runs on a host or node and provides + the features and functions of a hardware-based + network switch. + @@ -4773,7 +4772,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, VLAN manager - A Compute component that provides dnsmasq, radvd, + A Compute component that provides dnsmasq and radvd and sets up forwarding to and from cloudpipe instances. @@ -4817,6 +4816,12 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Compute. + + VMware NSX Neutron plugin + + Provides support for VMware NSX in Neutron. + + VNC proxy @@ -4830,7 +4835,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, Disk-based data storage generally represented as an iSCSI target with a file system that supports - extended attributes, can be persistent or + extended attributes; can be persistent or ephemeral. @@ -4907,12 +4912,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, An OpenStack-supported hypervisor. - - - - - - @@ -4929,7 +4928,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, weight - Used by swift storage devices to determine which + Used by Object Storage devices to determine which storage devices are suitable for the job. Devices are weighted by size. @@ -4944,15 +4943,14 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, worker - A daemon that listens to a queue and carries out tasks in response to messages. For example, - the cinder-volume worker attaches - storage to instances. - - - - - - + + A daemon that listens to a queue and carries out + tasks in response to messages. For example, the + cinder-volume worker + manages volume creation and deletion on storage + arrays. + @@ -4986,12 +4984,6 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, An OpenStack-supported hypervisor. - - - - - - @@ -5022,12 +5014,7 @@ Each entry in a typical ACL specifies a subject and an operation. For instance, parallel. - - - - - - +