Glossary of terms¶
-
Affinity¶
-
Affinity specifies that instances within a server group are co-located on the same host or hosts. Anti-affinity specifies that instances within the server group are distributed across different hosts. Soft anti-affinity and soft affinity allow less-strict policy execution.
-
See also:
-
Anti-affinity¶
- See Affinity.
-
Application credential¶
-
Application credentials are authentication mechanisms that enable applications to make API requests without using user credentials or extended life tokens. Application credentials use Roles-Based Access Control and can include an expiration date.
-
See also:
-
Availability zone¶
-
Availability zones are the geographic regions in which your underlying cloud hardware and infrastructure reside. When planning your cloud project, take into account the availability zone when considering cost, residency, latency, compliance, disaster recovery, backup, and high availability strategies.
-
See also:
-
Block storage¶
-
Block storage (Volumes service) is a type of data storage typically used in storage-area network (SAN) environments where data is stored in fixed-size blocks, each with a unique address. In block storage, data is organized as an array of blocks, and each block can be individually accessed and managed.
-
See also:
-
Certificate¶
-
Certificates are X.509 Certificates that are used for secure communication between systems in your cloud networks.
-
See also:
-
CIDR notation¶
-
CIDR notation is a compact way of representing an IP address and its associated network mask, which defines the size and boundaries of a network.
-
CIDR notation is written as an IP address followed by a slash (/) and a number, which represents the subnet mask in terms of the number of leading 1 bits. For example:
- 192.168.1.0/24: This represents the IPv4 network 192.168.1.0 with a subnet mask of 255.255.255.0, covering IP addresses from 192.168.1.0 to 192.168.1.255.
- 2001:db8::/32: This represents the IPv6 network 2001:db8:: with a subnet mask that includes the first 32 bits, covering the IP address range within that specific prefix.
-
See also:
-
Classless inter-domain routing (CIDR)¶
-
CIDR is a notation used to specify IP address ranges and subnet masks for networks and subnets within the Network service.
-
See also:
-
Cloud console¶
- See Rumble Cloud Console.
-
cloud.init¶
-
cloud-init is the industry standard multi-distribution method for cross-platform cloud instance initialization. It is supported across all major public cloud providers, provisioning systems for private cloud infrastructure, and bare-metal installations.
-
See also:
-
Cloud yaml file¶
-
cloud.yaml files are configuration files used with CLI tools to set authentication and authorization details for one or more cloud projects.
-
See also:
-
Cloud¶
-
Clouds are networked computing resources that are available as online services. Clouds lets you create and manage virtual machines, networks, and computing resources using self-service billing, provisioning, and management. Clouds can reduce ownership costs versus owning and managing physical servers and hardware, and can help reduce the time and effort to build, test, and scale your projects.
-
See also:
-
Cluster template¶
-
Cluster templates are files that define the characteristics of clusters including the image, flavor, and network. Creating a cluster requires the definition of at least one cluster template.
-
See also:
-
Cluster¶
-
Clusters are a group of containers managed as a logical unit.
-
See also:
-
Container orchestration engine (COE)¶
-
Container orchestration engines (or COE) manage the lifecycle of one or more containers as a cluster.
-
See also:
-
Container¶
-
Containers are packaged software including dependencies and an operating system that enable containers to run on different physical devices regardless of the native operating system of the device.
-
See also:
-
Distributed virtual routing (DVR)¶
-
Distributed Virtual Routing (DVR) is a networking architecture used in cloud environments, such as OpenStack, to provide more efficient routing of network traffic between virtual machines (VMs) and external networks. In traditional virtual routing architectures, all external traffic to and from VMs must pass through a centralized network node or router, which can become a bottleneck and single point of failure.
-
See also:
-
Domain Name System (DNS)¶
- DNS is a hierarchical and decentralized naming system used to translate human-readable domain names (such as www.example.com) into numerical IP addresses (like 192.0.2.1 for IPv4 or 2001:db8::1 for IPv6) that are used by computers to locate and communicate with each other on the internet or private networks.
-
External network¶
-
External networks are networks that connect your Rumble Cloud projects to the internet.
-
See also:
-
Flavor¶
-
Flavors are the virtual hardware specifications of a virtual machine, such as memory, CPU, and storage. You’ll select a flavor based on a general use case, such as general purpose, memory-optimized, or compute-optimized.
-
See also:
-
Floating IP address¶
-
Floating IP addresses are IP addresses that you can assign to your virtual machine instance from a predefined pool of static public addresses. They enable your cloud resources to communicate with the internet using an IP address. Floating IP addresses are assigned to the user, and the owner of the floating IP can associate, disassociate, and re-assign the address as needed.
-
See also:
-
High availability (HA)¶
-
High Availability (HA) refers to the design and implementation of systems and services within a cloud environment to ensure continuous operation and minimal downtime, even in the event of hardware failures, network issues, or other disruptions. The goal of HA is to provide a reliable and resilient cloud infrastructure that can maintain service availability and data integrity under various fault conditions.
-
See also:
-
Hybrid cloud¶
-
Hybrid clouds combine both public and private cloud services.
-
See also:
-
Hypertext Transfer Protocol (HTTP)¶
- HTTP is a foundational protocol used for transmitting data on the World Wide Web. It is a request-response protocol that enables communication between clients (such as web browsers) and servers (where websites are hosted).
-
Image¶
-
Images are virtual machine definitions that specify properties such as operating system and operating system version. A virtual machine runs its own independent and isolated operating system on top of a physical computer’s operating system, enabling a single physical computer to support multiple virtual machines at once.
-
See also:
-
Instance¶
-
Instances are virtual machine images that you activate and put into use (as an instance of a given image template) as servers.
-
See also:
-
Instance snapshot¶
-
Instance snapshots are backups of your instance that capture not just the data but also the state of your virtual machine.
-
See also:
- Compute service: Instance snapshots](../services/compute_service/instance_snapshots.html)
-
Instance tag¶
-
Instance tags are key-value pairs that you can use to help manage and organize your cloud resources. Tags can be used to search and filter for resources in the platform and can also be used in automation scripts. Your cloud environment may come with pre-defined key-value pairs for common software and environments.
-
See also:
-
Internet Control Message Protocol (ICMP)¶
- ICMP is a network layer protocol used within the Internet Protocol Suite (IP). It is primarily used for diagnostic and error-reporting purposes to help manage and control network communication. ICMP is core part of IP and is used by network devices like routers, switches, and hosts to send error messages and operational information indicating the status of network communication.
-
Internet Message Access Protocol (IMAP)¶
- IMAP is a protocol used for accessing and managing email messages on a mail server. It allows users to view, organize, and manipulate their emails directly on the server, rather than having to download them to their local device.
-
Internet Protocol version 4 (IPv4)¶
- IPv4 is the fourth version of the Internet Protocol (IP) and is the most widely used version for routing and addressing data packets over the internet and other networks. It is the foundational protocol that allows devices to communicate over a network by providing unique addresses to each device and specifying how data should be routed between them.
-
Internet Protocol version 6 (IPv6)¶
- IPv6 is the most recent version of the Internet Protocol (IP), which is the set of rules that devices use to communicate over the internet and other networks. IPv6 was developed to address the limitations of the previous version, IPv4, primarily the exhaustion of available IPv4 addresses.
-
IP address (Internet Protocol)¶
- IP addresses, or Internet Protocol addresses, are unique numerical identifiers assigned to each device connected to a computer network that uses the Internet Protocol for communication. IP addresses are essential for enabling network communication between instances (virtual machines), accessing instances from external networks, and managing network services.
-
Key pair¶
-
Key pairs are an authentication mechanism that uses a pair of keys: a public key (that you share with others) to encrypt data, and a private key (that is never shared with anyone) to decrypt. You can store or generate your key pair in your Rumble Cloud project and use your key pairs to authenticate into your virtual machine.
-
See also:
-
Kubernetes¶
-
Kubernetes is a popular open-source container orchestration system (COE). Although Rumble Cloud supports the deployment of Kubernetes (and other container orchestration engines), no orchestration systems are pre-installed by default nor does Rumble Cloud specify how you choose to deploy container orchestration.
-
See also:
-
Lightweight Directory Access Protocol (LDAP)¶
- LDAP is a protocol used for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. It is commonly used for organizing and providing access to directories that store information about users, groups, computers, and other resources within a network.
-
Local area network (LAN)¶
-
Local area networks (LANs) are partitioned, logical subnets within a network.
-
See also:
-
Load balancer¶
-
Load balancers are a networking component that distribute incoming traffic across multiple backend instances (such as virtual machines or containers) to optimize resource utilization, maximize throughput, minimize response time, and ensure high availability of applications and services. The load balancer acts as a single point of entry for client requests and uses various algorithms (e.g., round-robin, least connections) to decide which backend instance should handle each request.
-
See also:
-
Load balancing as a service (LBaaS)¶
-
Load Balancing as a Service (LBaaS) is a cloud computing model that provides the distribution of network traffic across multiple servers or computing resources. The primary goal of LBaaS is to enhance the availability, performance, and scalability of applications by ensuring that no single server becomes overwhelmed with requests, thereby reducing the risk of service outages and improving response times for users.
-
See also:
-
MAC address¶
-
MAC addresses (Media Access Control) are unique identifiers assigned to network interface cards (NIC) for use as a network addresses in communications within a network segment. A MAC address is a hardware address that identifies each device on a local network uniquely. MAC addresses are used in the data link layer (Layer 2) of the OSI (Open Systems Interconnection) model.
-
See also:
-
Network¶
-
Networks are isolated Layer 2 networking segments. In Rumble Cloud, networks refer to virtual networks that provide connectivity between instances (virtual machines), routers, and other network resources within the cloud environment. Networks are managed by the Network service.
-
See also:
-
Network address translation (NAT)¶
-
Network Address Translation (NAT) is a method used in networking to modify network address information in packet headers while in transit across a traffic routing device, typically a router or firewall. The primary purpose of NAT is to enable multiple devices on a private network to access the internet using a single public IP address. This helps conserve the limited number of IPv4 addresses available and provides a layer of security by hiding the internal network structure from external entities.
-
See also:
-
Network topology¶
-
Network topology shows the relationships between the different networks and network resources in your project.
-
See also:
-
NVMe¶
-
Non-Volatile Memory express or NVMe is a high-performance, low-latency storage protocol and interface standard used for Rumble Cloud object storage.
-
See also:
-
Object storage¶
-
Object storage (also called S3 storage) lets you store objects (files) in object containers (or just containers). You can use APIs or the cloud console to upload and edit stored objects. You can make objects private or public (and accessible online).
-
See also:
-
OpenRC file¶
-
openrc.sh files (also called OpenStack RC and OpenRC files) are shell scripts used with the OpenStack CLI client to set environment variables, authentication and authorization details, available API endpoints, domain, and export commands.
-
See also:
-
Ports¶
-
Ports are connection points for a device such as a virtual machine instance to a network. Ports use network interfaces to connect to networks to virtual machine instances.
-
See also:
-
Post Office Protocol 3 (POP3)¶
- POP3 is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. It is one of the most widely used protocols for downloading emails from a remote server to a local client, allowing users to access their email offline.
-
Project¶
-
Projects are isolated workspaces within a domain that enable resources and users to operate independently from other projects. Projects are sometimes referred to as tenants.
-
See also:
-
Private cloud¶
-
Private clouds are cloud services that are privately owned and controlled by an organization. Private clouds may be managed on-site by the organization, or they can be managed by a cloud provider.
-
See also:
-
Public cloud¶
-
Public clouds are cloud infrastructure and services managed and sold by a cloud provider. Customers can use public cloud services without having to manage or own physical hardware.
-
See also:
-
Quality of service (QoS)¶
-
Quality of Service (Qos) policies are sets of rules that manage network resources and traffic to ensure certain traffic is prioritized.
-
See also:
-
Remote Desktop Protocol (RDP)¶
- RDP is a proprietary protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.
-
Role-based access control (RBAC)¶
-
Role-based access control (or RBAC) determines the features and functions available to you. Your Rumble Cloud administrator has assigned user roles and permissions for each project to which you are assigned.
-
See also:
-
Router¶
-
Virtual routers are logical entities within the Networking service that provides Layer 3 (L3) routing and forwarding capabilities. Virtual routers enable network traffic to be routed between different subnets within a cloud environment, as well as provide external connectivity to instances (virtual machines) through the use of floating IP addresses and Network Address Translation (NAT).
-
See also:
-
Rumble Cloud console¶
- Rumble Cloud console is a graphical user interface for managing your cloud projects.
-
Routing table¶
-
Routing tables are data structures used by routers and networking devices to store information about the paths to various network destinations. The primary purpose of a routing table is to determine the best route for forwarding packets to their intended destinations.
-
See also:
-
S3 credential¶
-
S3 credentials are authentication tokens used to authenticate into object storage. S3 credentials are based on the object storage interface originally developed by Amazon (Simple Storage Service) and now widely adopted across cloud providers. Credentials take the form of an access key (used as a username) and secret (used as a password).
-
See also:
-
Security group¶
-
Security groups are a set of firewall rules to allow and deny inbound (ingress) and outbound (egress) traffic.
-
See also:
-
Server group¶
-
Server groups are instructions that specify affinity or anti-affinity policies for the placement of instances. The policies influence how instances are placed on physical hosts within your cloud, and can be used as a part of your overall cloud architecture strategies for isolating resources, performance, optimization, and high-availability.
-
See also:
-
Shared network¶
-
Shared networks are networks shared across Rumble Cloud projects.
-
See also:
-
Simple Mail Transfer Protocl (SMTP)¶
- SMTP is an Internet standard protocol used for sending and transmitting email messages between mail servers, as well as for sending messages from a mail client to a mail server. It operates at the application layer of the Internet Protocol Suite and is the primary protocol used for email relay and delivery.
-
Stack¶
-
Stacks (also called Heat stacks) are instantiated Heat template files.
-
See also:
-
TLS termination¶
-
TLS termimation (also known as SSL termination), refers to the process of decrypting encrypted traffic (using the Transport Layer Security or Secure Sockets Layer protocols) at a specific point in the network, typically at a load balancer or reverse proxy. After the traffic is decrypted, it is forwarded to the destination server in plain text. The server then sends its response back to the load balancer, which encrypts the response and sends it back to the client.
-
See also:
-
Template file¶
-
Template files (also called Heat templates and just templates) are written in a human-readable format, such as YAML or JSON, and used by the Automation service to specify cloud resources, states, dependencies, state rollbacks, and auto-scaling. Templates are used in conjunction for managing your cloud resources. Use cases include deployment automation or resource auto-scaling.
-
See also:
-
Token¶
-
Tokens (or API tokens) are temporary credentials that you’ll use for authentication into API resources. You’ll present your token in the header of your API requests.
-
See also:
-
Transmission Control Protocol (TCP)¶
- TCP is a connection-oriented protocol used for reliable transmission of data between devices on a network. It ensures that data is delivered in order and without errors.
-
User Datagram Protocol (UDP)¶
- UDP is a connectionless protocol used for transmitting data with minimal overhead. It does not guarantee delivery, order, or error checking, making it faster but less reliable than TCP.
-
Virtual adaptors¶
-
Virtual adaptors (also called *virtual network interface cards) are software abstractions that provide the functionality of a physical network interface. Virtual machine instances use virtual adaptors to connect to a network.
-
See also:
-
Virtual machine (VM)¶
-
Virtual machines (VM) use software to replicate a physical computer. Instead of provisioning a physical server, you use an existing server (managed by Rumble Cloud) onto which you provision, deploy, and manage code that works as a virtual machine. In this way, you can quickly provision servers without worrying about managing the physical hardware running them.
-
See also:
-
Virtual private network (VPN)¶
- Virtual private networks enable the creation of secure, encrypted connections over a public or shared network, such as the internet. The VPN service enables users to establish secure communication channels between different parts of their cloud environment or between their cloud and external networks.
-
Volume¶
-
Volumes are block storage devices that can be attached to and detached from instances to provide persistent storage for virtual machines.
-
See also:
-
Volume backup¶
-
Volume backups are complete copies of a volume that are stored independently of the original volume, useful for redundant, physically distributed backups.
-
See also:
-
Volume clone¶
-
Volume clones are exact replicas of an existing volume, and are useful for backups or standardized provisioning.
-
See also:
-
Volume snapshot¶
-
Volume snapshots are a kind of volume backup that also captures the state of the volume for a given point-in-time. Snapshots can be used for backup, recovery, and when creating new virtual machine instances. Unlike clones or backups, volume snapshots depend upon and refernce the original storage volume.
-
See also: