The document provides an overview of an introductory hands-on workshop on OpenStack. It discusses key topics like virtualization, types of virtualization, cloud computing models, OpenStack architecture and core projects. The workshop aims to provide an introduction to cloud computing, OpenStack deployment, configuration and usage through hands-on exercises.
This presentation lecture was delivered in HITEC University, Pakistan. This is my view of the cloud and next generation computing infrastructure supported by the cloud infrastructure.
“The chapter is organized into two primary sections that explore cloud delivery model issues pertaining to cloud providers and cloud consumers respectively.”
The cloud computing paradigm is still evolving, but has recently gained tremendous momentum. However, security and privacy issues pose as the key roadblock to its fast adoption. In this paper we present security and privacy challenges that are exacerbated by the unique aspects of clouds and show how they're related to various delivery and deployment models. We discuss various approaches to address these challenges, existing solutions, and future work needed to provide a trustworthy cloud computing environment.
This presentation lecture was delivered in HITEC University, Pakistan. This is my view of the cloud and next generation computing infrastructure supported by the cloud infrastructure.
“The chapter is organized into two primary sections that explore cloud delivery model issues pertaining to cloud providers and cloud consumers respectively.”
The cloud computing paradigm is still evolving, but has recently gained tremendous momentum. However, security and privacy issues pose as the key roadblock to its fast adoption. In this paper we present security and privacy challenges that are exacerbated by the unique aspects of clouds and show how they're related to various delivery and deployment models. We discuss various approaches to address these challenges, existing solutions, and future work needed to provide a trustworthy cloud computing environment.
The aim of this project is to secure the sensitive outsourced data with encryption and data fragmentation within the cloud provider. The major requirements for achieving security in outsourced cloud databases are confidentiality, privacy, availability and integrity. While achieving the requirements various data confidentiality mechanisms of fragmentation and encryption of data are used. This project presents a method for secure and confidential storage of data in the cloud environment based on fragmentation. Applying encryption and obfuscation techniques on the cloud data will provide more protection against unauthorized access of sensitive data of a private user.
Introduction to Cloud
Cloud Types
Cloud Deployment Models
Cloud Service Model
Cloud architecture
Challenges and Risks in cloud Computing
Cloud Features, Characteristics and Applications
IT Geek Week 2016 - Introduction To Cloud ComputingHaim Ateya
An introduction to cloud computing which provides users information about different cloud models, types, how it all fit in in today's world and lay out the ecosystem. in addition, I provide some additional information on cloud technologies like storage, network and compute.
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
we discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, we discuss a scheme for secure third party publications of documents in a cloud. Next, we will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, we discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure
cloud computing.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
Private Cloud Architecture: Moving Wits beyond the cutting edge. This is a talk on our private cloud architecture that we are implementing at the University of the Witwatersrand, Johannesburg.
The aim of this project is to secure the sensitive outsourced data with encryption and data fragmentation within the cloud provider. The major requirements for achieving security in outsourced cloud databases are confidentiality, privacy, availability and integrity. While achieving the requirements various data confidentiality mechanisms of fragmentation and encryption of data are used. This project presents a method for secure and confidential storage of data in the cloud environment based on fragmentation. Applying encryption and obfuscation techniques on the cloud data will provide more protection against unauthorized access of sensitive data of a private user.
Introduction to Cloud
Cloud Types
Cloud Deployment Models
Cloud Service Model
Cloud architecture
Challenges and Risks in cloud Computing
Cloud Features, Characteristics and Applications
IT Geek Week 2016 - Introduction To Cloud ComputingHaim Ateya
An introduction to cloud computing which provides users information about different cloud models, types, how it all fit in in today's world and lay out the ecosystem. in addition, I provide some additional information on cloud technologies like storage, network and compute.
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
we discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, we discuss a scheme for secure third party publications of documents in a cloud. Next, we will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, we discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure
cloud computing.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
Private Cloud Architecture: Moving Wits beyond the cutting edge. This is a talk on our private cloud architecture that we are implementing at the University of the Witwatersrand, Johannesburg.
Two Parts
Part One: Overview of Cloud Computing, Definition, History, Cloud Service Models, Cloud Storage Types, Visualization etc.
Part Two: Open Source Cloud Computing
Open Source Hyper-visors
Development of CloudStack
Installation Overview
Conclusion
Cloud Computing for college presenation project.Mahesh Tibrewal
This presentation I've made on Cloud computing can be used by students for their college projects. I've tried to make this as colourful and attractive as possible without losing the relevance with the topic.
What is Cloud Computing
virtualization
Cloud Networking
Cloud networking (and Cloud based networking) is a term describing the access of networking resources from a centralized third-party provider using Wide Area Networking (WAN) or Internet-based access technologies.
Cloud networking is related the concept of cloud computing, in which centralized computing resources are shared for customers or clients. In cloud networking, the network can be shared as well as the computing resources. It has spurred a trend of pushing more network management functions into the cloud, so that fewer customer devices are needed to manage the network.
This Presentation will give you the introduction to Cloud Computing. This PPT was presented by me as an assignment in my final year of B.Tech degree. I hope it would prove beneficial to your understanding of this subject. Thank You!
Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.
Cloud Computing is both a combination of software and hardware based computing resources delivered as a network service.
Basic Concepts:
There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing:
1. Deployment Models
2. Service Models
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Similar to Presentation on Openstack in null Bhopal Chapter (20)
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
2. About Me
Hemraj Singh Chouhan
Red Hat Certified Instrustor(RHCI)
facebook.com/hschouhan
@hschouhan
Institute for Technical Education
Auth. Redhat Training Partner
www.linuxacademy.org
o
3. Checklist For Workshop
•Introduction about Cloud Computing
•Idea about Virtualization
•Introduction about Open Stack
•Configuring Puppet File
•Deployment of Open Stack
•Functionality of Open Stack Portal
•Launching Instances
4. What is Virtualization
Virtualization is the process of creating a software-based (or
virtual) representation of something rather than a physical
one. Virtualization can apply to applications, servers,
storage, and networks and is the single most effective way to
reduce IT expenses while boosting efficiency and agility for
all size businesses.
5. Types of Virtualization
• Full Virtualization
• Para Virtualization
• Native Virtualization (Hardware Assist)
Benefits of Virtualization
• Reduce capital and operating costs.
• Minimize or eliminate downtime.
• Increase IT productivity, efficiency, agility and responsiveness.
• Provision applications and resources faster.
• Enable business continuity and disaster recovery.
• Simplify data centre management.
• Build a true Software-Defined Data Center
6. Full Virtualization
Full Virtualization is virtualization in which the guest operating system is unaware that it is in a
virtualized environment, and therefore hardware is virtualized by the host operating system so
that the guest can issue commands to what it thinks is actual hardware, but really are just
simulated hardware devices created by the host.
Para Virtualization
Paravirtualization is virtualization in which the guest operating system (the one being
virtualized) is aware that it is a guest and accordingly has drivers that, instead of issuing
hardware commands, simply issue commands directly to the host operating system. This also
includes memory and thread management as well, which usually require unavailable
privileged instructions in the processor
Native Virtualization
Native Virtualization is a form of virtualization which allows almost code to be run directly by the
CPU without ant changes, for efficiency. The hypervisor only needs to intervene when the code
contains sensitive instructions that would interfaces with the state of the hypervisor or its supporting
environment. These sensitive instruction need to be intercepted by the hypervisor and replace with
the safe equivalent before they execute on the CPU. The hypervisor replaces the sensitive
instructions with safe instruction that emulated the operation.
7. What is Cloud Computing ?
Cloud computing, often referred to as simply “the cloud,” is the delivery of on-
demand computing resources—everything from applications to data centres—
over the Internet on a pay-for-use basis. Cloud computing is the use of
computing resources (hardware and software) that are delivered as services over
a network (typically the Internet).
These services are broadly divided into three categories:
1) Infrastructure-as-a-Service (IaaS)
2) Platform-as-a-Service (PaaS)
3) Software-as-a-Service (SaaS)
The goal of cloud computing is to provide easy, scalable access to computing
resources and IT services.
8. Models of Clouds
Cloud hosting deployment models represent the exact category of
cloud environment and are mainly distinguished by the
proprietorship, size and access. It tells about the purpose and the
nature of the cloud. Most of the organisations are willing to
implement cloud as it reduces the capital expenditure and controls
operating cost. In order to know which deployment model matches
your requirements it is necessary to know the four deployment
models.
• Public Cloud
• Private Cloud
• Hybrid Cloud
• Community Cloud
9. Public Cloud
Public clouds are owned and operated by companies that offer
rapid access over a public network to affordable computing
resources. With public cloud services, users don’t need to purchase
hardware, software, or supporting infrastructure, which is owned
and managed by providers.
Private Cloud
A private cloud is infrastructure operated solely for a single
organization, whether managed internally or by a third party, and
hosted either internally or externally. Private clouds can take
advantage of cloud’s efficiencies, while providing more control of
resources and steering clear of multi-tenancy.
Key aspects of private cloud
10. Hybrid Cloud
A hybrid cloud uses a private cloud foundation combined with the
strategic integration and use of public cloud services. The reality is
a private cloud can’t exist in isolation from the rest of a company’s
IT resources and the public cloud. Most companies with private
clouds will evolve to manage workloads across data canters,
private clouds, and public clouds—thereby creating hybrid clouds.
Community Cloud
Community cloud is a type of cloud hosting in which the setup is
mutually shared between many organisations that belong to a
particular community, i.e. banks and trading firms. It is a multi-
tenant setup that is shared among several organisations that belong
to a specific group which has similar computing apprehensions.
11. Cloud Service Model
Private
(On-Premise)
Infrastructure
(as a Service)
Platform
(as a Service)
Software
(as a Service)
Storage
Server HW
Networking
Servers
Databases
Virtualization
Runtimes
Applications
Security & Integration
Storage
Server HW
Networking
Servers
Databases
Virtualization
Runtimes
Applications
Security & Integration
Storage
Server HW
Networking
Servers
Databases
Virtualization
Runtimes
Applications
Security & Integration
Storage
Server HW
Networking
Servers
Databases
Virtualization
Runtimes
Security & Integration
Applications
Managed by you Managed by vendor
12. What is Open Stack
An Open Source Cloud Framework
13. OpenStack Cloud
OpenStack is a community of open source
developers, participating organizations and
users who are building and running the open
source cloud operating system.
“OpenStack is an Infrastructure as a service which is known as a
Cloud Operating System, that takes resources such as compute,
storage, network, virtualization technologies and controls those
resources at a data center level”
“OpenStack’s basic requirement: “Cloud must be simple to
implement and massively scalable”
15. OpenStack Projects
Nova(Compute):- Manages the lifecycle of compute instances in an OpenStack
environment. Responsibilities include spawning, scheduling and decomissioning of
machines on demand.
Neutron (Networking) :- Enables network connectivity as a service for other
OpenStack services, such as OpenStack Compute. Provides an API for users to define
networks and the attachments into them. Has a pluggable architecture that supports
many popular networking vendors and technologies.
Swift (Object Storage) :- Stores and retrieves arbitrary unstructured data objects via a
RESTful, HTTP based API. It is highly fault tolerant with its data replication and scale
out architecture. Its implementation is not like a file server with mountable directories.
Cinder (Block Storage):- Provides persistent block storage to running instances. Its
pluggable driver architecture facilitates the creation and management of block storage
devices.
Keystone (Identity) :- Provides an authentication and authorization service for other
OpenStack services. Provides a catalog of endpoints for all OpenStack services.
Glance (Image Service):- Stores and retrieves virtual machine disk images.
OpenStack Compute makes use of this during instance provisioning.
16. Horizon (Dashboard)
A web-based interface for managing OpenStack
services. It provides a graphical user interface for
operations such as launching instances, managing
networking and setting access controls.