Fix OpenStack-Ansible refs w/o hyphen

Change-Id: I0809fdbc81d275dc818f0cddb1635cc16185c6f2
This commit is contained in:
Major Hayden 2015-12-07 09:45:27 -06:00
parent e142145b0e
commit 8d5343db3c
17 changed files with 24 additions and 24 deletions

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Appendix C. Minor Upgrades Appendix C. Minor Upgrades
-------------------------- --------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Appendix E. Using PLUMgrid Neutron Plugin Appendix E. Using PLUMgrid Neutron Plugin
----------------------------------------- -----------------------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Appendix D. Tips and Tricks Appendix D. Tips and Tricks
--------------------------- ---------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Active Directory Federation Services (ADFS) 3.0 as an identity provider Configure Active Directory Federation Services (ADFS) 3.0 as an identity provider
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Identity Service (keystone) as a federated identity provider Configure Identity Service (keystone) as a federated identity provider
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Identity Service (keystone) Domain-Project-Group-Role mappings Configure Identity Service (keystone) Domain-Project-Group-Role mappings
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,9 +1,9 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Identity Service (keystone) service provider background Identity Service (keystone) service provider background
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In openstack-ansible (OSA) the Identity Service (keystone) is set up to In OpenStack-Ansible (OSA) the Identity Service (keystone) is set up to
use Apache with mod_wsgi. The additional configuration of use Apache with mod_wsgi. The additional configuration of
keystone as a federation service provider adds Apache mod_shib keystone as a federation service provider adds Apache mod_shib
and configures it to respond to specific locations requests and configures it to respond to specific locations requests

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Configure Identity Service (keystone) as a federated service provider Configure Identity Service (keystone) as a federated service provider
--------------------------------------------------------------------- ---------------------------------------------------------------------

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Identity Service to Identity Service federation example use-case Identity Service to Identity Service federation example use-case
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Using Identity Service to Identity Service federation Using Identity Service to Identity Service federation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@ -42,7 +42,7 @@ Unfortunately, many of the steps above involve manually sending API requests.
The infrastructure for the command line utilities to perform all these steps The infrastructure for the command line utilities to perform all these steps
for the user does not yet exist. for the user does not yet exist.
To simplify the task of obtaining access to a SP cloud, OpenStack Ansible provides a script that wraps the above steps. The script is called ``federated-login.sh`` and is To simplify the task of obtaining access to a SP cloud, OpenStack-Ansible provides a script that wraps the above steps. The script is called ``federated-login.sh`` and is
used as follows:: used as follows::
# ./scripts/federated-login.sh -p project [-d domain] sp_id # ./scripts/federated-login.sh -p project [-d domain] sp_id

View File

@ -1,4 +1,4 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Configuring Identity Service federation (optional) Configuring Identity Service federation (optional)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View File

@ -79,7 +79,7 @@ in your ``/etc/openstack_deploy/user_variables.yml``:
Securing HAProxy communication with SSL certificates Securing HAProxy communication with SSL certificates
#################################################### ####################################################
The openstack-ansible project provides the ability to secure HAProxy The OpenStack-Ansible project provides the ability to secure HAProxy
communications with self-signed or user-provided SSL certificates. communications with self-signed or user-provided SSL certificates.
Refer to `Securing services with SSL certificates`_ for available configuration Refer to `Securing services with SSL certificates`_ for available configuration

View File

@ -9,7 +9,7 @@ Customizing the Horizon deployment is done within
Securing Horizon communication with SSL certificates Securing Horizon communication with SSL certificates
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The openstack-ansible project provides the ability to secure Horizon The OpenStack-Ansible project provides the ability to secure Horizon
communications with self-signed or user-provided SSL certificates. communications with self-signed or user-provided SSL certificates.
Refer to `Securing services with SSL certificates`_ for available configuration Refer to `Securing services with SSL certificates`_ for available configuration

View File

@ -9,7 +9,7 @@ Customizing the Keystone deployment is done within
Securing Keystone communication with SSL certificates Securing Keystone communication with SSL certificates
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The openstack-ansible project provides the ability to secure Keystone The OpenStack-Ansible project provides the ability to secure Keystone
communications with self-signed or user-provided SSL certificates. communications with self-signed or user-provided SSL certificates.
Refer to `Securing services with SSL certificates`_ for available configuration Refer to `Securing services with SSL certificates`_ for available configuration

View File

@ -4,7 +4,7 @@ Configuring RabbitMQ (optional)
------------------------------- -------------------------------
RabbitMQ provides the messaging broker for various OpenStack services. The RabbitMQ provides the messaging broker for various OpenStack services. The
openstack-ansible project configures a plaintext listener on port 5672 and OpenStack-Ansible project configures a plaintext listener on port 5672 and
a SSL/TLS encrypted listener on port 5671. a SSL/TLS encrypted listener on port 5671.
Customizing the RabbitMQ deployment is done within Customizing the RabbitMQ deployment is done within
@ -13,7 +13,7 @@ Customizing the RabbitMQ deployment is done within
Add a TLS encrypted listener to RabbitMQ Add a TLS encrypted listener to RabbitMQ
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
The openstack-ansible project provides the ability to secure RabbitMQ The OpenStack-Ansible project provides the ability to secure RabbitMQ
communications with self-signed or user-provided SSL certificates. Refer to communications with self-signed or user-provided SSL certificates. Refer to
`Securing services with SSL certificates`_ for available configuration `Securing services with SSL certificates`_ for available configuration
options. options.

View File

@ -8,7 +8,7 @@ deployment is highly recommended in the `OpenStack Security Guide`_.
.. _OpenStack Security Guide: http://docs.openstack.org/security-guide/secure-communication.html .. _OpenStack Security Guide: http://docs.openstack.org/security-guide/secure-communication.html
The openstack-ansible project currently offers the ability to configure SSL The OpenStack-Ansible project currently offers the ability to configure SSL
certificates for secure communication with the following services: certificates for secure communication with the following services:
* HAProxy * HAProxy
@ -32,7 +32,7 @@ Self-signed certificates
Self-signed certificates make it easy to get started quickly and they ensure Self-signed certificates make it easy to get started quickly and they ensure
data is encrypted in transit, but they don't provide a high level of trust data is encrypted in transit, but they don't provide a high level of trust
for highly secure environments. The use of self-signed certificates is for highly secure environments. The use of self-signed certificates is
currently the default in openstack-ansible. When self-signed certificates are currently the default in OpenStack-Ansible. When self-signed certificates are
being used, certificate verification must be disabled using the following being used, certificate verification must be disabled using the following
user variables depending on your configuration. These variables can be added user variables depending on your configuration. These variables can be added
in ``/etc/openstack_deploy/user_variables.yml``. in ``/etc/openstack_deploy/user_variables.yml``.

View File

@ -1,9 +1,9 @@
`Home <index.html>`__ OpenStack Ansible Installation Guide `Home <index.html>`__ OpenStack-Ansible Installation Guide
Security Security
-------- --------
The openstack-ansible project provides several security features for The OpenStack-Ansible project provides several security features for
OpenStack deployments. This section of documentation covers some of those OpenStack deployments. This section of documentation covers some of those
features and how they can benefit deployers of various sizes. features and how they can benefit deployers of various sizes.
@ -24,7 +24,7 @@ specific limits and policies around what resources a particular application
can access. Any activity outside the allowed policies is denied at the kernel can access. Any activity outside the allowed policies is denied at the kernel
level. level.
In openstack-ansible, AppArmor profiles are applied that limit the actions In OpenStack-Ansible, AppArmor profiles are applied that limit the actions
that each LXC container may take on a system. This is done within the that each LXC container may take on a system. This is done within the
`lxc_hosts role`_. `lxc_hosts role`_.
@ -37,7 +37,7 @@ Encrypted communication
~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
Data is encrypted while in transit between some OpenStack services in Data is encrypted while in transit between some OpenStack services in
openstack-ansible deployments. Not all communication between all services is OpenStack-Ansible deployments. Not all communication between all services is
currently encrypted. For more details on what traffic is encrypted, and how currently encrypted. For more details on what traffic is encrypted, and how
to configure SSL certificates, refer to the documentation section titled to configure SSL certificates, refer to the documentation section titled
`Securing services with SSL certificates`_. `Securing services with SSL certificates`_.