The convergence of open source application, each open source software we call an application.
A scenario-oriented system composed of multiple open source applications
Cloud Marketplace is a software transaction and delivery platform provided by Cloud platform.
Marketplace Image are the images provided by Publisher on Cloud Marketplace
Cloud Console is the web GUI that build, manage, and monitor everything from simple web apps to complex cloud applications in a single, unified console.
Command Line Interface (CLI) is cross-platform command-line experience for managing Cloud resources. The CLI is easy to learn and the perfect tool for building custom automation that works with Cloud resources.
Cloud Server = Cloud Instance, or ECS, VM, EC2
Image is a operating system template includes some software.
A security group implements access controls for Instance, specifying the communication scope of Instance. You can define different access control rules for a security group, and these rules take effect for all Instance added to this security group. By default, a security group allows all data packets that are sent out from VMin it, and VM in the same security group can access each other
Cloud-Init is the industry standard multi-distribution method for cross-platform cloud instance initialization.
DNS (domain name server) is a service that routes internet traffic to websites by translating friendly domain names like www.example.com into the numeric IP addresses like 192.0.2.1 that computers use to connect to each other
A port is an endpoint of communication in computer networking. This can be hardware port, a logical port, or both. TCP and UDP ports are identified by their port number (an integer from 0 to 65535)
A cryptographic network protocol for operating network services securely over an unsecured network based at the application layer and transport layer
Secure Shell key pair (SSH key pair)
An authentication method available for logging in to VM instances remotely. An SSH key pair is a pair of keys generated through an encryption algorithm: one key is publicly available (the public key) and the other key is kept confidential (the private key).
If you have placed the public key in a Linux instance, you can use the private key to log on to the instance using SSH commands or related tools from a local computer or another instance without a password
SFTP (SSH File Transfer Protocol) is a secure file transfer protocol. It runs over the SSH protocol . It supports the full security and authentication functionality of SSH
Internet IP is a address's for your Instance, it can be used to access your application directly
A fixed amount of storage on an instance. It's the same with disk
Every instance has one attached operating system disk. That OS disk has a pre-installed OS, which was selected when the instance was created.
A copy of data on a disk at a certain time point. There are two types of snapshots, automatic snapshots and user-created snapshots.