DevOps Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

DAST

Dynamic Application Security Testing; analyzes running applications to find vulnerabilities.

DDoS

Distributed Denial of Service; cyberattack that floods a system with traffic to make it unavailable.

DNS Lookup Time

Time taken to query the Domain Name System to translate a domain name into an IP address.

DORA Metrics

Four key metrics (deployment frequency, lead time for changes, time to restore service, change failure rate) used to measure software delivery performance.

Dark Launch

Technique of releasing features to production that are invisible to users until activated, allowing for testing in real environments.

Dark Launching

Deploying code or feature flags to production without making them visible to users.

Dark Release

Releasing new features to production that are invisible to users until activated.

Dashboards

Visual displays of key performance indicators and metrics, providing at-a-glance views of business performance or system status.

Data Breach

Incident where sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by unauthorized individuals.

Data Leakage

Unauthorized transmission of data from within an organization to an external destination or recipient.

Data Loss Prevention (DLP)

Set of tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.

Data Security

Protective measures applied to prevent unauthorized access to databases, websites, and computers.

Database Management

Process of storing, organizing, and managing data in databases, ensuring data integrity, security, and accessibility.

Database Versioning

Practice of keeping different versions of database schemas, often in conjunction with application versioning.

Datadog

Monitoring and analytics platform for cloud-scale applications, providing full-stack observability for IT infrastructure and application performance.

Dead Code

Source code that's never executed or has no effect on program output, often a target for removal to improve maintainability and performance.

Declarative Infrastructure

Defining infrastructure using a descriptive model, focusing on what should be deployed rather than how.

Dedicated Environment

Computing resources exclusively allocated to a single user, project, or organization.

Defense-in-Depth (DiD)

Cybersecurity strategy that employs multiple layers of security controls to protect assets and data from various types of threats.

Definition of Done

Agreed-upon set of items that must be completed before a project or user story can be considered complete.

Deis

Open-source Platform-as-a-Service (PaaS) that makes it easy to deploy and manage applications.

Denial of Service (DoS)

Cyberattack aimed at making a machine or network resource unavailable to its intended users.

Deploykit

Tool designed to simplify and automate the process of deploying software applications across different environments and platforms.

Deployment

Process of making software available and ready for use in a specific environment.

Deployment Frequency

Rate at which new code or features are deployed to production, often used as a key metric in DevOps practices.