-
Notifications
You must be signed in to change notification settings - Fork 28
Taxonomy of failsafe levels #579
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
88ede08
5e0742d
9a1c2cd
e0c87bf
41a75a2
020bf8b
f0f75cb
d475eb1
04be929
367d992
b190440
525d9e8
ba729d4
fbca525
2777c6a
a9633b1
d3fea7f
9dfb9c0
9d22126
437217f
b904df0
57b1d30
05418ff
36c0d7f
2d1663b
358b429
dcd910b
d375608
9d59e63
1f3de87
2a492f8
53c6521
90e311d
0e39254
2a52226
1fbab3a
5ffe31a
7931127
ee531ad
37ec252
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -12,30 +12,26 @@ When talking about redundancy and backups in the context of cloud infrastructure | |
| This decision record aims to define different levels of failure-safety. | ||
| These levels can then be used in standards to clearly set the scope that certain procedures in e.g. OpenStack offer. | ||
|
|
||
| ## Terminology | ||
|
|
||
| Image | ||
| OpenStack resource, virtual machine images usually residing in a network storage backend. | ||
| Volume | ||
| OpenStack resource, virtual drive which usually resides in a network storage backend. | ||
| Virtual Machine (abbr. VM) | ||
| IaaS resource, also called server, executes workloads from users. | ||
| Secret | ||
| OpenStack ressource, cryptographic asset stored in the Key Manager (e.g. Barbican). | ||
| Key Encryption Key (abbr. KEK) | ||
| OpenStack resource, used to encrypt other keys to be able to store them encrypted in a database. | ||
| Floating IP (abbr. FIP) | ||
| OpenStack resource, an IP that is usually routed and accessible from external networks. | ||
| Disk | ||
| A physical disk drive (e.g. HDD, SSD) in the infrastructure. | ||
| Node | ||
| A physical machine in the infrastructure. | ||
| Cyber threat | ||
| Attacks on the infrastructure through the means of electronic access. | ||
| ## Glossary | ||
|
|
||
| | Term | Explanation | | ||
| | ------------------ | ---------------------------------------------------------------------------------------------------------------------------------------- | | ||
| | Virtual Machine | Equals the `server` resource in Nova. | | ||
| | Ephemeral Storage | Disk storage directly supplied to a virtual machine by Nova. Different from volumes. | | ||
| | (Glance) Image | IaaS resource usually storing raw disk data. Managed by the Glance service. | | ||
| | (Cinder) Volume | IaaS resource representing block storage disk that can be attached as a virtual disk to virtual machines. Managed by the Cinder service. | | ||
| | (Volume) Snapshot | Thinly-provisioned copy-on-write snapshots of volumes. Stored in the same Cinder storage backend as volumes. | | ||
| | Volume Type | Attribute of volumes determining storage details of a volume such as backend location or whether the volume will be encrypted. | | ||
| | (Barbican) Secret | IaaS resource storing cryptographic assets such as encryption keys. Managed by the Barbican service. | | ||
| | Key Encryption Key | IaaS resource, used to encrypt other keys to be able to store them encrypted in a database. | | ||
|
||
| | Floating IP | IaaS resource, an IP that is usually routed and accessible from external networks. | | ||
| | Disk | A physical disk drive (e.g. HDD, SSD) in the infrastructure. | | ||
| | Node | A physical machine in the infrastructure. | | ||
josephineSei marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| | Cyber threat | Attacks on the infrastructure through the means of electronic access. | | ||
|
|
||
| ## Context | ||
|
|
||
| Some standards provided by the SCS will talk about or require procedures to backup resources or have redundancy for resources. | ||
| Some standards provided by the SCS project will talk about or require procedures to backup resources or have redundancy for resources. | ||
| This decision record should discuss, which failure threats are CSP-facing and will classify them into several levels. | ||
| In consequence these levels should be used in standards concerning redundancy or failure-safety. | ||
|
|
||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.