Merge "Fix OpenStack-Ansible refs w/o hyphen"

This commit is contained in:
Jenkins 2015-12-08 22:36:41 +00:00 committed by Gerrit Code Review
commit 2de197517f
17 changed files with 24 additions and 24 deletions

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Appendix C. Minor Upgrades
--------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Appendix E. Using PLUMgrid Neutron Plugin
-----------------------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Appendix D. Tips and Tricks
---------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Active Directory Federation Services (ADFS) 3.0 as an identity provider
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Identity Service (keystone) as a federated identity provider
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Identity Service (keystone) Domain-Project-Group-Role mappings
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,9 +1,9 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Identity Service (keystone) service provider background
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In openstack-ansible (OSA) the Identity Service (keystone) is set up to
In OpenStack-Ansible (OSA) the Identity Service (keystone) is set up to
use Apache with mod_wsgi. The additional configuration of
keystone as a federation service provider adds Apache mod_shib
and configures it to respond to specific locations requests

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Identity Service (keystone) as a federated service provider
---------------------------------------------------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Identity Service to Identity Service federation example use-case
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Using Identity Service to Identity Service federation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -42,7 +42,7 @@ Unfortunately, many of the steps above involve manually sending API requests.
The infrastructure for the command line utilities to perform all these steps
for the user does not yet exist.
To simplify the task of obtaining access to a SP cloud, OpenStack Ansible provides a script that wraps the above steps. The script is called ``federated-login.sh`` and is
To simplify the task of obtaining access to a SP cloud, OpenStack-Ansible provides a script that wraps the above steps. The script is called ``federated-login.sh`` and is
used as follows::
# ./scripts/federated-login.sh -p project [-d domain] sp_id

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Configuring Identity Service federation (optional)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -79,7 +79,7 @@ in your ``/etc/openstack_deploy/user_variables.yml``:
Securing HAProxy communication with SSL certificates
####################################################
The openstack-ansible project provides the ability to secure HAProxy
The OpenStack-Ansible project provides the ability to secure HAProxy
communications with self-signed or user-provided SSL certificates.
Refer to `Securing services with SSL certificates`_ for available configuration

View File

@ -9,7 +9,7 @@ Customizing the Horizon deployment is done within
Securing Horizon communication with SSL certificates
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The openstack-ansible project provides the ability to secure Horizon
The OpenStack-Ansible project provides the ability to secure Horizon
communications with self-signed or user-provided SSL certificates.
Refer to `Securing services with SSL certificates`_ for available configuration

View File

@ -9,7 +9,7 @@ Customizing the Keystone deployment is done within
Securing Keystone communication with SSL certificates
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The openstack-ansible project provides the ability to secure Keystone
The OpenStack-Ansible project provides the ability to secure Keystone
communications with self-signed or user-provided SSL certificates.
Refer to `Securing services with SSL certificates`_ for available configuration

View File

@ -4,7 +4,7 @@ Configuring RabbitMQ (optional)
-------------------------------
RabbitMQ provides the messaging broker for various OpenStack services. The
openstack-ansible project configures a plaintext listener on port 5672 and
OpenStack-Ansible project configures a plaintext listener on port 5672 and
a SSL/TLS encrypted listener on port 5671.
Customizing the RabbitMQ deployment is done within
@ -13,7 +13,7 @@ Customizing the RabbitMQ deployment is done within
Add a TLS encrypted listener to RabbitMQ
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The openstack-ansible project provides the ability to secure RabbitMQ
The OpenStack-Ansible project provides the ability to secure RabbitMQ
communications with self-signed or user-provided SSL certificates. Refer to
`Securing services with SSL certificates`_ for available configuration
options.

View File

@ -8,7 +8,7 @@ deployment is highly recommended in the `OpenStack Security Guide`_.
.. _OpenStack Security Guide: http://docs.openstack.org/security-guide/secure-communication.html
The openstack-ansible project currently offers the ability to configure SSL
The OpenStack-Ansible project currently offers the ability to configure SSL
certificates for secure communication with the following services:
* HAProxy
@ -32,7 +32,7 @@ Self-signed certificates
Self-signed certificates make it easy to get started quickly and they ensure
data is encrypted in transit, but they don't provide a high level of trust
for highly secure environments. The use of self-signed certificates is
currently the default in openstack-ansible. When self-signed certificates are
currently the default in OpenStack-Ansible. When self-signed certificates are
being used, certificate verification must be disabled using the following
user variables depending on your configuration. These variables can be added
in ``/etc/openstack_deploy/user_variables.yml``.

View File

@ -1,9 +1,9 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide
`Home <index.html>`__ OpenStack-Ansible Installation Guide
Security
--------
The openstack-ansible project provides several security features for
The OpenStack-Ansible project provides several security features for
OpenStack deployments. This section of documentation covers some of those
features and how they can benefit deployers of various sizes.
@ -24,7 +24,7 @@ specific limits and policies around what resources a particular application
can access. Any activity outside the allowed policies is denied at the kernel
level.
In openstack-ansible, AppArmor profiles are applied that limit the actions
In OpenStack-Ansible, AppArmor profiles are applied that limit the actions
that each LXC container may take on a system. This is done within the
`lxc_hosts role`_.
@ -37,7 +37,7 @@ Encrypted communication
~~~~~~~~~~~~~~~~~~~~~~~
Data is encrypted while in transit between some OpenStack services in
openstack-ansible deployments. Not all communication between all services is
OpenStack-Ansible deployments. Not all communication between all services is
currently encrypted. For more details on what traffic is encrypted, and how
to configure SSL certificates, refer to the documentation section titled
`Securing services with SSL certificates`_.