workspace
1. Introduction
1.1. Configuration Policy
1.2. Release 1 Scope
2. Definitions
3. Abbreviations
4. Use Cases
4.1. Resource Requirements
4.1.1. Workload Placement
4.1.1.1. Affinity
4.1.1.2. Anti-Affinity
4.1.1.3. DMZ Deployment
4.1.2. Configuration Auditing
4.2. Generic Policy Requirements
4.2.1. NFVI Self-Service Constraints
4.2.1.1. Network Access Control
4.2.1.2. Storage Access Control
4.2.2. Resource Management
4.2.2.1. Resource Reclamation
4.2.2.2. Resource Use Limits
5. Architecture
5.1. Architectural Concept
5.2. Architectural Aspects
6. Requirements
6.1. Resource Requirements
6.2. Generic Policy Requirements
6.3. Requirements Validation Approach
workspace
Docs
»
Please activate JavaScript to enable the search functionality.