Containerization & Orchestration Glossary

From Docker to Kubernetes to Terraform, your passport to the containerized world of modern deployment.

Scheduler Extender

External process allowing custom logic to be added to the Kubernetes scheduling decisions.

Scheduling Algorithms

Methods used by Kubernetes scheduler to determine the best node placement for pods based on various factors.

Scheduling Framework

Kubernetes component allowing plugins to customize the scheduling process without changing the core scheduler code.

Scheduling Plugins

Modular components in Kubernetes scheduler implementing specific scheduling behaviors and policies.

Scheduling Profiles

Configurations defining sets of scheduling plugins to be used for different scheduling scenarios in Kubernetes.

Seccomp BPF

Use of Berkeley Packet Filter programs to define fine-grained seccomp profiles for container security.

Seccomp Profiles

Security profiles defining allowed system calls for containers, enhancing isolation and reducing attack surface.

Secret

Kubernetes object for storing and managing sensitive information such as passwords, tokens, or keys.

Secrets Management

Process of securely storing, distributing, and rotating sensitive data in containerized environments.

Secure Computing Mode (seccomp)

Linux kernel feature limiting the system calls a process can make, often used to secure containers.

Secure Supply Chain

Practices ensuring the integrity and security of container images and their dependencies throughout the development lifecycle.

Security Context Constraint

OpenShift object defining a set of conditions that a pod must run with to be accepted into the system.

Security Context Constraints

OpenShift feature for fine-grained control over the actions containers can perform and the resources they can access.

Security Scanning in CI Pipeline

Integration of vulnerability and compliance scans into the continuous integration process for container images.

Serverless Frameworks

Tools and platforms for building and deploying serverless applications on container orchestration systems.

Serverless Observability

Techniques and tools for monitoring, tracing, and debugging serverless functions and applications.

Serverless Patterns

Architectural patterns for designing and implementing serverless applications in containerized environments.

Serverless Security

Practices and tools for securing serverless functions and applications in container-based infrastructures.

Serverless Workflows

Orchestration of multiple serverless functions to create complex, event-driven applications.

Service

Kubernetes abstraction defining a logical set of pods and a policy by which to access them.

Service Account Token Volume Projection

Kubernetes feature for securely delivering service account tokens to pods, enhancing security.

Service Account Tokens

Credentials automatically generated for pods to authenticate with the Kubernetes API server.

Service Discovery Pattern

Technique allowing services to locate and communicate with each other dynamically in containerized environments.

Service Mesh Control Plane

Component of a service mesh responsible for managing and configuring the data plane proxies.

Service Mesh Data Plane

Component of a service mesh consisting of proxies that intercept and control service-to-service communication.