• Authentication method = Used for two factor authentication methods


  • Bandwidth (or, data transfer) = The amount of data transferred on your portion of the server. For example, if someone visits your site, you’ll be charged bandwidth for each image they view, text, and if they download or upload anything.


  • Card view = Displays the items (can be instances, volumes, images etc) in a card view

  • Client = A client contains billing information (name, email address, postal code, phone number etc) and it’s usually assigned to a user

  • Client groups = A group of clients

  • Cloud Operator = The person responsible for installing, configuring, and managing Fleio

  • Cloud-init = A package commonly installed in VM images that performs initialization of an instance after boot using information that it retrieves from the metadata service, such as the SSH public key and user data.

  • Clusters = A set of worker machines, called nodes, that run containerized applications. Every cluster has at least one worker node

  • Clusters templates = A predefined clusters configuration which allows end users to easily deploy a cluster

  • Configurable option = Refers to a product configurable option

  • Configuration = Configuration assigned to clients. Contains the settings for billing, agreements, billing cycles, invoices, suspension, termination etc.


  • Django = A web framework used extensively in Fleio’s backend


  • Flavor = Alternative term for a VM instance type

  • Flavor group = a group of flavors

  • Floating IP = An IP address that a project can associate with a VM so that the instance has the same public IP address each time that it boots.


  • IP address = An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network. Two versions of the Internet Protocol (IP) are in use for addresses: IPv4 and IPv6.

  • Image = A collection of files for a specific operating system (OS) that you use to create or rebuild a server.

  • Instance = A running VM, or a VM in a known state such as suspended, which emulates a hardware server.

  • Instance ID = Alternative term for instance UUID.

  • Instance state = Instance state can be running, suspended, shut down etc.

  • Instance state = The current state of a guest VM image.

  • Instance type = Describes the parameters of the various virtual machine images that are available to users; includes parameters such as CPU, storage, and memory. Alternative term for flavor.


  • Journal = Contains a list of all Journal entries

  • Journal entry = Contains information regarding transactions (like invoice payments), such as date, source info, destination information and amount.


  • List view = Displays the items (can be instances, volumes, images etc) in a tabular view


  • Network = A virtual network that provides connectivity between entities. For example, a collection of virtual ports that share network connectivity. In Networking terminology, a network is always a layer-2 network.


  • Openstack Plan = An openstack plan contains pricing rules

  • Operations = Refers to long-running operations such as booting instances with volumes


  • Port = A virtual network port within Networking; VIFs / vNICs are connected to a port.

  • Pricing rule = In a pricing rule you defined the cost for a resource. Can contain filters and modifiers.

  • Pricing rule filter = A filter can be used when you want to apply a pricing rule only to specific resources.

  • Pricing rule modifier = A modifier can be used on a pricing rule to apply a custom value for specific filter (for example you can add a modifier for operating system = windows)


  • Registrar = Refers to a domain name registrar and it is a company that manages the reservation of Internet domain names.

  • Resource = A resource can be an instance, a volume, an image, a floating IP etc

  • Router = A physical or virtual network device that passes network traffic between different networks.


  • SELinux = Linux kernel security module that provides the mechanism for supporting access control policies.

  • SSH = Secure Shell. Open source tool used to access remote hosts through an encrypted communications channel

  • SSH key = A term that is generally used to refer to an identity and authorized keys. The term may also be occasionally used to refer to host or server private keys.

  • Security group = A set of network traffic filtering rules that are applied to a Compute instance.

  • Snapshot = A point-in-time copy of an instance or a volume.

  • Soft reboot = A controlled reboot where a VM instance is properly restarted through operating system commands.

  • Subnet = Logical subdivision of an IP network.

  • Swap = Disk-based virtual memory used by operating systems to provide more memory than is actually available on the system.


  • TLD = Top level domain

  • Tax rules = Allows you to configure tax rules (like VAT) for each country


  • User = A user contains the client’s login information (username, email address, password) and it’s usually assigned to a client

  • User groups = A group of users

  • Username = A name used in conjunction with a password to gain access to a computer system or a network service.


  • Virtual machine (VM) = An operating system instance that runs on top of a hypervisor. Multiple VMs can run at the same time on the same physical host.

  • Volume = Disk-based data storage generally represented as an iSCSI target with a file system that supports extended attributes; can be persistent or ephemeral.


  • Zones = A zone (also known as a DNS zone) provides access to DNS configuration for domains